


default search action
Computer Communications, Volume 186
Volume 186, March 2022
- Chen Fang

, Yuanbo Guo, Jiali Ma, Haodong Xie, Yifeng Wang
:
A privacy-preserving and verifiable federated learning method based on blockchain. 1-11
- Khalid Mahmood, Muhammad Faizan Ayub

, Syed Zohaib Hassan
, Zahid Ghaffar
, Zhihan Lv
, Shehzad Ashraf Chaudhry
:
A seamless anonymous authentication protocol for mobile edge computing infrastructure. 12-21
- Bing Bu:

Network coding data distribution technology between streams of emergency system based-wireless multi-hop network. 22-32
- Haibo Yi

:
A secure blockchain system for Internet of Vehicles based on 6G-enabled Network in Box. 45-50
- Carlos A. Hernández-Morales

, J. M. Luna-Rivera
, Rafael Pérez Jiménez:
Design and deployment of a practical IoT-based monitoring system for protected cultivations. 51-64 - Vijayalakshmi Chetlapalli

, Himanshu Agrawal, K. S. S. Iyer, Mark A. Gregory
, Vidyasagar M. Potdar, Reza Nejabati
:
Performance evaluation of IoT networks: A product density approach. 65-79 - Juan José Pérez Solano

, Santiago Felici-Castell
, Antonio Soriano-Asensi
, Jaume Segura-Garcia:
Time synchronization enhancements in wireless networks with ultra wide band communications. 80-89 - Jin Ye, Lin Li, Zihan Chen, Guihao Chen, Sen Liu

, Jiawei Huang, Jianxin Wang, Tian He:
ECN-based shared bottleneck detection for multi-path TCP. 90-101 - Yunmin Wang

, Ting Huang, Guohua Wei, Hui Li, Huayu Zhang:
Scalable name identifier lookup for Industrial Internet. 102-109
- Fengyin Li

, Xinying Yu
, Yang Cui
, Siqi Yu, Yuhong Sun, Yilei Wang, Huiyu Zhou:
An anonymous authentication and key agreement protocol in smart living. 110-120 - Xingmiao Wang

, Kai Fan, Kan Yang
, Xiaochun Cheng, Qingkuan Dong, Hui Li, Yintang Yang:
A new RFID ultra-lightweight authentication protocol for medical privacy protection in smart living. 121-132
- Fabiha Hashmat, Syed Ghazanfar Abbas

, Sadaf Hina
, Ghalib A. Shah, Taimur Bakhshi
, Waseem Abbas:
An automated context-aware IoT vulnerability assessment rule-set generator. 133-152
- Na Dong

, Minghui Qin
, Jianfang Chang, Chun-Ho Wu
, Wai-Hung Ip
, Kai-Leung Yung:
Weighted triplet loss based on deep neural networks for loop closure detection in VSLAM. 153-165
- Sangita Roy, Tal Shapira

, Yuval Shavitt
:
Fast and lean encrypted Internet traffic classification. 166-173

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














