


default search action
Computer Communications, Volume 221
Volume 221, 2024
- Zechao Liu, Tao Liang, Jiazhuo Lyu

, Dapeng Lang:
A security-enhanced scheme for MQTT protocol based on domestic cryptographic algorithm. 1-9 - Xu Yan, Jinyao Liu, Ligang Cong, Xiaoqiang Di, Nannan Xie, Ziyang Xing, Hui Qi:

Game theory-based switch migration strategy for satellite networks. 10-18 - Lulu Liu

, Ling Xing, Jianping Gao, Honghai Wu, Huahong Ma:
Trajectory privacy protection method with smart contract-based query exchange in the Social Internet of Vehicles. 19-28 - Usman Haruna Garba

, Adel Nadjaran Toosi
, Muhammad Fermi Pasha
, Suleman Khan:
SDN-based detection and mitigation of DDoS attacks on smart homes. 29-41 - Chengkai Zhou, Kadhim Mustafa Raad Kadhim

, Xu Zheng:
Multi-UAVs path planning for data harvesting in adversarial scenarios. 42-53 - Shalini Yadav, Rahul Rishi:

Joint mode selection and resource allocation for cellular V2X communication using distributed deep reinforcement learning under 5G and beyond networks. 54-65 - Duc Thinh Vu

, Ba Cao Nguyen
, Nguyen Van Vinh
, Taejoon Kim
, Bao The Phung
:
Full/half-duplex unmanned aerial vehicles assisted wireless systems: Performance analysis and optimization. 66-77 - Sachin Trankatwar

, Prashant K. Wali
:
Power allocation scheme for sum rate and fairness trade-off in downlink NOMA networks. 78-89 - Yasmine Harbi, Zibouda Aliouat, Saad Harous, Abdelhak Mourad Guéroui:

Lightweight blockchain-based remote user authentication for fog-enabled IoT deployment. 90-105 - Elmehdi Illi

, Marwa K. Qaraqe, Faissal El Bouanani, Saif Al-Kuwari
:
Enhancing physical layer security with reconfigurable intelligent surfaces and friendly jamming: A secrecy analysis. 106-119 - Zhuo Li

, Ziyu Liu, Jindian Liu, Yu Zhang, Teng Liang
, Kaihua Liu:
AGC Sketch: An effective and accurate per-flow measurement to adapt flow size distribution. 120-130 - Amna Arouj, Ahmed M. Abdelmoniem

:
Towards Energy-Aware Federated Learning via Collaborative Computing Approach. 131-141 - Amandeep Verma

, Rahul Saha
, Gulshan Kumar, Mauro Conti
:
PETRAK: A solution against DDoS attacks in vehicular networks. 142-154

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














