


default search action
Computer Communications, Volume 218
Volume 218, 2024
- Mouna Rabhi
, Roberto Di Pietro
:
An efficient failure-resilient mutual exclusion algorithm for distributed systems leveraging a novel zero-message overlay structure. 1-13 - David Franco
, Eder Ollora Zaballa
, Mingyuan Zang
, Asier Atutxa
, Jorge Sasiain
, Aleksander Pruski
, Elisa Rojas
, Marivi Higuero
, Eduardo Jacob
:
A comprehensive latency profiling study of the Tofino P4 programmable ASIC-based hardware. 14-30 - Liquan Chen
, Yaqing Zhu, Suhui Liu, Hongtao Yu, Bing Zhang:
PUF-based dynamic secret-key strategy with hierarchical blockchain for UAV swarm authentication. 31-43 - Benjamín Arratia
, Erika Rosas
, Carlos T. Calafate
, Juan-Carlos Cano
, José M. Cecilia
, Pietro Manzoni
:
AlLoRa: Empowering environmental intelligence through an advanced LoRa-based IoT solution. 44-58 - Jin Chen, Ziyang Guo, Liang Tan
:
Blockchain-based remote operation and maintenance network slicing resource transaction method for intelligent manufacturing products. 59-71 - Hasan Kivrak
, Muhammed Z. Karakusak
, Simon Watson
, Barry Lennox
:
Cyber-physical system architecture of autonomous robot ecosystem for industrial asset monitoring. 72-84 - Kun Tang
, Guitao Xu, Pengwei Yan, Haoshen Zhu
, Wenjie Feng:
Coverage performance of cooperative NOMA MmWave networks with wireless power transfer. 85-96 - Khushnaseeb Roshan
, Aasim Zafar, Sheikh Burhan Ul Haque
:
Untargeted white-box adversarial attack with heuristic defence methods in real-time deep learning based network intrusion detection system. 97-113 - Oscar Amador
, María Calderón
, Manuel Urueña, Ignacio Soto
:
Evaluation of Greedy and CBF for ETSI non-area GeoNetworking: The impact of DCC. 114-130 - Chenlu Gao
, Jing Yan, Xian Yang
, Xiaoyuan Luo, Xinping Guan:
An attack-resistant target localization in underwater based on consensus fusion. 131-147 - Xiaolin Wu, Demin Li
, Peng Wang
, Qinghua Tang
, Xuemin Chen
:
EAPRAD: A MAC protocol for Enhancing Access Probability and Reducing Access Delay in VANETs. 148-156 - Sebastian Boehm, Hartmut König:
Radio-in-the-Loop simulation and emulation modeling for energy-efficient and cognitive Internet of Things in smart cities: A cross-layer optimization case study. 157-165 - Chih-Chung Lin
, Yuan-Cheng Lai
, Zelalem Legese Hailemariam
:
A distinguished-bit tracking knowledge-based query tree for RFID tag identification. 166-175 - Walid Abdallah:
A physical layer security scheme for 6G wireless networks using post-quantum cryptography. 176-187 - Shuanggen Liu
, Zhentao Liu, Jueqin Liang, Wanju Zhang, Zirong Heng:
A secure certificateless ring signcryption scheme based on SM2 algorithm in smart grid. 188-197 - Fucai Zhou, Qiyu Wu
, Pengfei Wu, Jian Xu, Da Feng
:
Privacy-preserving and verifiable data aggregation for Internet of Vehicles. 198-208 - Iacovos Ioannou
, Prabagarane Nagaradjane, Pelin Angin
, Palaniappan Balasubramanian, Karthick Jeyagopal Kavitha, Palani Murugan, Vasos Vassiliou:
GEMLIDS-MIOT: A Green Effective Machine Learning Intrusion Detection System based on Federated Learning for Medical IoT network security hardening. 209-239 - Zhenshen Ou, Xiaofei Xing
, Siqi He, Guojun Wang:
TDS-NA: Blockchain-based trusted data sharing scheme with PKI authentication. 240-252 - Yulin Qin
, Jie Zheng
, Hai Wang, Ling Gao, Yuhui Ma, Shuo Ji, Yi Liu, Jie Ren, Rui Cao, Yongxing Zheng:
Online Learning to parallel offloading in heterogeneous wireless networks. 253-262 - Fatma Foad Ashrif
, Elankovan A. Sundararajan
, Mohammad Kamrul Hasan, Rami Ahmad
, Aisha Hassan Abdalla Hashim, Azhar Abu Talib:
Provably secured and lightweight authenticated encryption protocol in machine-to-machine communication in industry 4.0. 263-275 - Agung Mulyo Widodo, Hsing-Chung Chen
:
An optimization NPUSCH uplink scheduling approach for NB-IoT application via the feasible combinations of link adaptation, Resource assignment and energy efficiency. 276-293

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
