![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Computer Communications, Volume 224
Volume 224, 2024
- Fernando Román-García
, Juan Hernández-Serrano, Oscar Esparza
:
DA2Wa: A secure pairing protocol between a DApp and a wallet for the blockchain scenario. 1-15 - Liang She, Wei Wang, Jianyuan Wang
, Zhili Lin
, Yangyan Zeng:
Progressive supervised pedestrian detection algorithm for green edge-cloud computing. 16-28 - Chen Cheng
, Linbo Zhai, Xiumin Zhu, Yujuan Jia, Yumei Li:
Dynamic task offloading and service caching based on game theory in vehicular edge computing networks. 29-41 - John Bosco Ssemakula
, Juan-Luis Gorricho
, Godfrey Kibalya, Joan Serrat-Fernández:
Optimized provisioning technique of future services with different QoS requirements in multi-access edge computing. 42-59 - Junbi Xiao, Jiaqi Zheng, Wu Wen, Mohsen Guizani, Peiying Zhang, Lizhuang Tan:
Multi-objective optimization of SFC deployment using service aggregation and computing offload. 60-71 - Bruno Marques Cremonezi, Alex Borges Vieira, José A. M. Nacif, Edelberto Franco Silva, Michele Nogueira:
Identity management for Internet of Things: Concepts, challenges and opportunities. 72-94 - Kasra Aminiyeganeh, Rodolfo W. L. Coutinho
, Azzedine Boukerche:
IoT video analytics for surveillance-based systems in smart cities. 95-105 - Yang Li
, Xiaolong Xu
, Gengjun Huang, Meiqi Yao, Lijuan Sun, Jian Xu:
VSFL: Trajectory prediction framework based on validity-aware semi-asynchronous federated learning in internet of vehicles. 106-117 - Ching-Kuo Hsu
:
An adaptive simulated annealing-based computational offloading scheme in UAV-assisted MEC networks. 118-124 - Khaleel Mershad
:
COSIER: A comprehensive lightweight blockchain system for IoT networks. 125-144 - Asier Atutxa
, Ane Sanz
, Jorge Sasiain
, Jasone Astorga
, Eduardo Jacob
:
Towards a quantum-safe 5G: Quantum Key Distribution in core networks. 145-158 - Dengzhi Liu
, Geng Yu, Zhaoman Zhong, Yuanzhao Song:
Secure multi-party computation with secret sharing for real-time data aggregation in IIoT. 159-168 - Farrukh Salim Shaikh, Yasir Saleem
, Roland Wismüller:
An interference-conscious reduced routing overhead protocol for Device-to-Device (D2D) Networks. 169-191 - Mohammad Hijjawi
, Faisal Jamil
, Harun Jamil
, Tariq A. A. Alsboui
, Richard Hill
, Ibrahim A. Hameed
:
Optimal smart contracts for controlling the environment in electric vehicles based on an Internet of Things network. 192-212 - Zhenjie Deng
, Yanwei Liu
, Jinxia Liu, Antonios Argyriou
, Dacai Liu:
BBR-based and fairness-guaranteed congestion control and packet scheduling for MPQUIC over heterogeneous networks. 213-224 - Rafael Estepa
, Mark Davis
, Vicente Mayor
, Antonio Jose Estepa
:
Supporting VoIP communication in IEEE 802.11ax networks: A new admission control and scheduling resource allocation scheme. 225-241 - Hao Jiang, Yilin Shang, Shan Xue, Dongsheng Guo, Weidong Zhang:
UMPL- VINS: Generalized SLAM for multi-scene metaverse applications. 242-253 - Jesus-Albany Armenta-García
, Félix Fernando González-Navarro, Jesús Caro-Gutierrez:
Wireless sensing applications with Wi-Fi Channel State Information, preprocessing techniques, and detection algorithms: A survey. 254-274 - Zhongcheng Wei, Wei Chen, Weitao Tao, Shuli Ning, Bin Lian, Xiang Sun, Jijun Zhao:
CATFSID: A few-shot human identification system based on cross-domain adversarial training. 275-284 - Xuening Guan
, Jinyong Chang, Wei Zhang:
Secure data sharing scheme with privacy-preserving and certificateless integrity auditing in cloud storage. 285-301 - Hongshuo Lyu, Jing Liu
, Yingxu Lai
, Beifeng Mao, Xianting Huang:
AGCM: A multi-stage attack correlation and scenario reconstruction method based on graph aggregation. 302-313
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.