default search action
Computer Communications, Volume 186
Volume 186, March 2022
- Chen Fang, Yuanbo Guo, Jiali Ma, Haodong Xie, Yifeng Wang:
A privacy-preserving and verifiable federated learning method based on blockchain. 1-11
- Khalid Mahmood, Muhammad Faizan Ayub, Syed Zohaib Hassan, Zahid Ghaffar, Zhihan Lv, Shehzad Ashraf Chaudhry:
A seamless anonymous authentication protocol for mobile edge computing infrastructure. 12-21
- Bing Bu:
Network coding data distribution technology between streams of emergency system based-wireless multi-hop network. 22-32
- Haibo Yi:
A secure blockchain system for Internet of Vehicles based on 6G-enabled Network in Box. 45-50
- Carlos A. Hernández-Morales, J. M. Luna-Rivera, Rafael Pérez Jiménez:
Design and deployment of a practical IoT-based monitoring system for protected cultivations. 51-64 - Vijayalakshmi Chetlapalli, Himanshu Agrawal, K. S. S. Iyer, Mark A. Gregory, Vidyasagar M. Potdar, Reza Nejabati:
Performance evaluation of IoT networks: A product density approach. 65-79 - Juan José Pérez Solano, Santiago Felici-Castell, Antonio Soriano-Asensi, Jaume Segura-Garcia:
Time synchronization enhancements in wireless networks with ultra wide band communications. 80-89 - Jin Ye, Lin Li, Zihan Chen, Guihao Chen, Sen Liu, Jiawei Huang, Jianxin Wang, Tian He:
ECN-based shared bottleneck detection for multi-path TCP. 90-101 - Yunmin Wang, Ting Huang, Guohua Wei, Hui Li, Huayu Zhang:
Scalable name identifier lookup for Industrial Internet. 102-109
- Fengyin Li, Xinying Yu, Yang Cui, Siqi Yu, Yuhong Sun, Yilei Wang, Huiyu Zhou:
An anonymous authentication and key agreement protocol in smart living. 110-120 - Xingmiao Wang, Kai Fan, Kan Yang, Xiaochun Cheng, Qingkuan Dong, Hui Li, Yintang Yang:
A new RFID ultra-lightweight authentication protocol for medical privacy protection in smart living. 121-132
- Fabiha Hashmat, Syed Ghazanfar Abbas, Sadaf Hina, Ghalib A. Shah, Taimur Bakhshi, Waseem Abbas:
An automated context-aware IoT vulnerability assessment rule-set generator. 133-152
- Na Dong, Minghui Qin, Jianfang Chang, Chun-Ho Wu, Wai-Hung Ip, Kai-Leung Yung:
Weighted triplet loss based on deep neural networks for loop closure detection in VSLAM. 153-165
- Sangita Roy, Tal Shapira, Yuval Shavitt:
Fast and lean encrypted Internet traffic classification. 166-173
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.