


default search action
Computer Communications, Volume 220
Volume 220, 2024
- Qingyi Zhu, Xuhang Luo, Yuhang Liu, Chenquan Gan
, Yu Wu
, Lu-Xing Yang:
Impact of cybersecurity awareness on mobile malware propagation: A dynamical model. 1-11 - Peiqiang Li, Guo-Jun Wang, Xiaofei Xing
, Jinyao Zhu, Wanyi Gu, Guangxin Zhai:
Detecting abnormal behaviors in smart contracts using opcode sequences. 12-22 - Xin Song, Runfeng Zhang
, Siyang Xu, Haiqi Hao, Jingyi Ma
:
Secrecy Enhancement of relay cooperative NOMA network based on user behavior. 23-34 - Zhong Wang, Funing Zhang, Anling Zhang, Jinyong Chang:
LFTDA: A lightweight and fault-tolerant data aggregation scheme with privacy-enhanced property in fog-assisted smart grid. 35-42 - Gaetano Patti
, Luca Leonardi
, Giuseppe Testa
, Lucia Lo Bello
:
PrioMQTT: A prioritized version of the MQTT protocol. 43-51 - Lakshmikanta Sau, Priyadarshi Mukherjee
, Sasthi C. Ghosh
:
DRAMS: Double-RIS assisted multihop routing scheme for device-to-device communication. 52-63 - Muhammad Aslam, Xianjun Jiao, Wei Liu, Michael T. Mehari, Thijs Havinga, Ingrid Moerman:
Corrigendum to 'A novel hardware efficient design for IEEE 802.11ax compliant OFDMA transceiver' [Comput. Commun. 219 (2024) 173-181]. 64 - Chen Wang
, Jian Xu, Haoran Li, Fucai Zhou, Qiang Wang:
Privacy-preserving and verifiable classifier training in edge-assisted mobile communication systems. 65-80 - Shihong Zou, Qiang Cao
, Ruichao Lu, Chenyu Wang, Guoai Xu, Huanhuan Ma, Yingyi Cheng, Jinwen Xi:
A robust and effective 3-factor authentication protocol for smart factory in IIoT. 81-93 - Perumalla Suman Prakash
, K. Seshadri Ramana, Renzon Daniel Cosmepecho, M. Janardhan, Meryelem Tania Churampi Arellano, J. Mahalakshmi, M. Bhavsingh, K. Samunnisa:
Learning-driven Continuous Diagnostics and Mitigation program for secure edge management through Zero-Trust Architecture. 94-107 - Farzad Moradi, Vesal Hakami
, Seyed Vahid Azhari:
Learning to optimize power allocation in cell-free massive MIMO networks with hybrid green energy. 108-127 - Xinxin Deng, Changgen Peng, Haoxuan Yang, Zongfeng Peng, Chongyi Zhong:
A dynamic data access control scheme for hierarchical structures in big data. 128-137 - Zhiwei Chang, Hanfeng Zhang, Yan Jia, Sihan Xu, Tong Li, Zheli Liu:
Low-cost fuzzing drone control system for configuration errors threatening flight safety in edge terminals. 138-148 - Chunhua Jin
, Wenyu Qin, Zhiwei Chen, Kaijun Sun, Guanhua Chen, Jinsong Shan, Liqing Chen:
Heterogeneous signcryption scheme with equality test from CLC to PKI for IoV. 149-159

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.