default search action
Computer Communications, Volume 218
Volume 218, 2024
- Mouna Rabhi, Roberto Di Pietro:
An efficient failure-resilient mutual exclusion algorithm for distributed systems leveraging a novel zero-message overlay structure. 1-13 - David Franco, Eder Ollora Zaballa, Mingyuan Zang, Asier Atutxa, Jorge Sasiain, Aleksander Pruski, Elisa Rojas, Marivi Higuero, Eduardo Jacob:
A comprehensive latency profiling study of the Tofino P4 programmable ASIC-based hardware. 14-30 - Liquan Chen, Yaqing Zhu, Suhui Liu, Hongtao Yu, Bing Zhang:
PUF-based dynamic secret-key strategy with hierarchical blockchain for UAV swarm authentication. 31-43 - Benjamín Arratia, Erika Rosas, Carlos T. Calafate, Juan-Carlos Cano, José M. Cecilia, Pietro Manzoni:
AlLoRa: Empowering environmental intelligence through an advanced LoRa-based IoT solution. 44-58 - Jin Chen, Ziyang Guo, Liang Tan:
Blockchain-based remote operation and maintenance network slicing resource transaction method for intelligent manufacturing products. 59-71 - Hasan Kivrak, Muhammed Z. Karakusak, Simon Watson, Barry Lennox:
Cyber-physical system architecture of autonomous robot ecosystem for industrial asset monitoring. 72-84 - Kun Tang, Guitao Xu, Pengwei Yan, Haoshen Zhu, Wenjie Feng:
Coverage performance of cooperative NOMA MmWave networks with wireless power transfer. 85-96 - Khushnaseeb Roshan, Aasim Zafar, Sheikh Burhan Ul Haque:
Untargeted white-box adversarial attack with heuristic defence methods in real-time deep learning based network intrusion detection system. 97-113 - Oscar Amador, María Calderón, Manuel Urueña, Ignacio Soto:
Evaluation of Greedy and CBF for ETSI non-area GeoNetworking: The impact of DCC. 114-130 - Chenlu Gao, Jing Yan, Xian Yang, Xiaoyuan Luo, Xinping Guan:
An attack-resistant target localization in underwater based on consensus fusion. 131-147 - Xiaolin Wu, Demin Li, Peng Wang, Qinghua Tang, Xuemin Chen:
EAPRAD: A MAC protocol for Enhancing Access Probability and Reducing Access Delay in VANETs. 148-156 - Sebastian Boehm, Hartmut König:
Radio-in-the-Loop simulation and emulation modeling for energy-efficient and cognitive Internet of Things in smart cities: A cross-layer optimization case study. 157-165 - Chih-Chung Lin, Yuan-Cheng Lai, Zelalem Legese Hailemariam:
A distinguished-bit tracking knowledge-based query tree for RFID tag identification. 166-175 - Walid Abdallah:
A physical layer security scheme for 6G wireless networks using post-quantum cryptography. 176-187 - Shuanggen Liu, Zhentao Liu, Jueqin Liang, Wanju Zhang, Zirong Heng:
A secure certificateless ring signcryption scheme based on SM2 algorithm in smart grid. 188-197 - Fucai Zhou, Qiyu Wu, Pengfei Wu, Jian Xu, Da Feng:
Privacy-preserving and verifiable data aggregation for Internet of Vehicles. 198-208 - Iacovos Ioannou, Prabagarane Nagaradjane, Pelin Angin, Palaniappan Balasubramanian, Karthick Jeyagopal Kavitha, Palani Murugan, Vasos Vassiliou:
GEMLIDS-MIOT: A Green Effective Machine Learning Intrusion Detection System based on Federated Learning for Medical IoT network security hardening. 209-239 - Zhenshen Ou, Xiaofei Xing, Siqi He, Guojun Wang:
TDS-NA: Blockchain-based trusted data sharing scheme with PKI authentication. 240-252 - Yulin Qin, Jie Zheng, Hai Wang, Ling Gao, Yuhui Ma, Shuo Ji, Yi Liu, Jie Ren, Rui Cao, Yongxing Zheng:
Online Learning to parallel offloading in heterogeneous wireless networks. 253-262 - Fatma Foad Ashrif, Elankovan A. Sundararajan, Mohammad Kamrul Hasan, Rami Ahmad, Aisha Hassan Abdalla Hashim, Azhar Abu Talib:
Provably secured and lightweight authenticated encryption protocol in machine-to-machine communication in industry 4.0. 263-275 - Agung Mulyo Widodo, Hsing-Chung Chen:
An optimization NPUSCH uplink scheduling approach for NB-IoT application via the feasible combinations of link adaptation, Resource assignment and energy efficiency. 276-293
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.