Search dblp for Publications

export results for "toc:db/journals/comcom/comcom220.bht:"

 download as .bib file

@article{DBLP:journals/comcom/AslamJLMHM24a,
  author       = {Muhammad Aslam and
                  Xianjun Jiao and
                  Wei Liu and
                  Michael T. Mehari and
                  Thijs Havinga and
                  Ingrid Moerman},
  title        = {Corrigendum to 'A novel hardware efficient design for {IEEE} 802.11ax
                  compliant {OFDMA} transceiver' [Comput. Commun. 219 {(2024)} 173-181]},
  journal      = {Comput. Commun.},
  volume       = {220},
  pages        = {64},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comcom.2024.03.021},
  doi          = {10.1016/J.COMCOM.2024.03.021},
  timestamp    = {Wed, 22 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/AslamJLMHM24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ChangZJXLL24,
  author       = {Zhiwei Chang and
                  Hanfeng Zhang and
                  Yan Jia and
                  Sihan Xu and
                  Tong Li and
                  Zheli Liu},
  title        = {Low-cost fuzzing drone control system for configuration errors threatening
                  flight safety in edge terminals},
  journal      = {Comput. Commun.},
  volume       = {220},
  pages        = {138--148},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comcom.2024.04.005},
  doi          = {10.1016/J.COMCOM.2024.04.005},
  timestamp    = {Wed, 24 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/ChangZJXLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/DengPYPZ24,
  author       = {Xinxin Deng and
                  Changgen Peng and
                  Haoxuan Yang and
                  Zongfeng Peng and
                  Chongyi Zhong},
  title        = {A dynamic data access control scheme for hierarchical structures in
                  big data},
  journal      = {Comput. Commun.},
  volume       = {220},
  pages        = {128--137},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comcom.2024.04.006},
  doi          = {10.1016/J.COMCOM.2024.04.006},
  timestamp    = {Wed, 22 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/DengPYPZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/JinQCSCSC24,
  author       = {Chunhua Jin and
                  Wenyu Qin and
                  Zhiwei Chen and
                  Kaijun Sun and
                  Guanhua Chen and
                  Jinsong Shan and
                  Liqing Chen},
  title        = {Heterogeneous signcryption scheme with equality test from {CLC} to
                  {PKI} for IoV},
  journal      = {Comput. Commun.},
  volume       = {220},
  pages        = {149--159},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comcom.2024.04.008},
  doi          = {10.1016/J.COMCOM.2024.04.008},
  timestamp    = {Thu, 25 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/JinQCSCSC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/LiWXZGZ24,
  author       = {Peiqiang Li and
                  Guo{-}Jun Wang and
                  Xiaofei Xing and
                  Jinyao Zhu and
                  Wanyi Gu and
                  Guangxin Zhai},
  title        = {Detecting abnormal behaviors in smart contracts using opcode sequences},
  journal      = {Comput. Commun.},
  volume       = {220},
  pages        = {12--22},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comcom.2024.03.016},
  doi          = {10.1016/J.COMCOM.2024.03.016},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/LiWXZGZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/MoradiHA24,
  author       = {Farzad Moradi and
                  Vesal Hakami and
                  Seyed Vahid Azhari},
  title        = {Learning to optimize power allocation in cell-free massive {MIMO}
                  networks with hybrid green energy},
  journal      = {Comput. Commun.},
  volume       = {220},
  pages        = {108--127},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comcom.2024.03.009},
  doi          = {10.1016/J.COMCOM.2024.03.009},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/MoradiHA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/PattiLTB24,
  author       = {Gaetano Patti and
                  Luca Leonardi and
                  Giuseppe Testa and
                  Lucia Lo Bello},
  title        = {PrioMQTT: {A} prioritized version of the {MQTT} protocol},
  journal      = {Comput. Commun.},
  volume       = {220},
  pages        = {43--51},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comcom.2024.03.018},
  doi          = {10.1016/J.COMCOM.2024.03.018},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/PattiLTB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/SauMG24,
  author       = {Lakshmikanta Sau and
                  Priyadarshi Mukherjee and
                  Sasthi C. Ghosh},
  title        = {{DRAMS:} Double-RIS assisted multihop routing scheme for device-to-device
                  communication},
  journal      = {Comput. Commun.},
  volume       = {220},
  pages        = {52--63},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comcom.2024.03.020},
  doi          = {10.1016/J.COMCOM.2024.03.020},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/SauMG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/SongZXHM24,
  author       = {Xin Song and
                  Runfeng Zhang and
                  Siyang Xu and
                  Haiqi Hao and
                  Jingyi Ma},
  title        = {Secrecy Enhancement of relay cooperative {NOMA} network based on user
                  behavior},
  journal      = {Comput. Commun.},
  volume       = {220},
  pages        = {23--34},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comcom.2024.03.013},
  doi          = {10.1016/J.COMCOM.2024.03.013},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/SongZXHM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/SumanprakashRCJAMBS24,
  author       = {P. Sumanprakash and
                  K. Seshadri Ramana and
                  Renzon Daniel Cosmepecho and
                  M. Janardhan and
                  Meryelem Tania Churampi Arellano and
                  J. Mahalakshmi and
                  M. Bhavsingh and
                  K. Samunnisa},
  title        = {Learning-driven Continuous Diagnostics and Mitigation program for
                  secure edge management through Zero-Trust Architecture},
  journal      = {Comput. Commun.},
  volume       = {220},
  pages        = {94--107},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comcom.2024.04.007},
  doi          = {10.1016/J.COMCOM.2024.04.007},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/SumanprakashRCJAMBS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/WangXLZW24,
  author       = {Chen Wang and
                  Jian Xu and
                  Haoran Li and
                  Fucai Zhou and
                  Qiang Wang},
  title        = {Privacy-preserving and verifiable classifier training in edge-assisted
                  mobile communication systems},
  journal      = {Comput. Commun.},
  volume       = {220},
  pages        = {65--80},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comcom.2024.04.003},
  doi          = {10.1016/J.COMCOM.2024.04.003},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/WangXLZW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/WangZZC24,
  author       = {Zhong Wang and
                  Funing Zhang and
                  Anling Zhang and
                  Jinyong Chang},
  title        = {{LFTDA:} {A} lightweight and fault-tolerant data aggregation scheme
                  with privacy-enhanced property in fog-assisted smart grid},
  journal      = {Comput. Commun.},
  volume       = {220},
  pages        = {35--42},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comcom.2024.03.019},
  doi          = {10.1016/J.COMCOM.2024.03.019},
  timestamp    = {Wed, 22 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/WangZZC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ZhuLLGWY24,
  author       = {Qingyi Zhu and
                  Xuhang Luo and
                  Yuhang Liu and
                  Chenquan Gan and
                  Yu Wu and
                  Lu{-}Xing Yang},
  title        = {Impact of cybersecurity awareness on mobile malware propagation: {A}
                  dynamical model},
  journal      = {Comput. Commun.},
  volume       = {220},
  pages        = {1--11},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comcom.2024.03.017},
  doi          = {10.1016/J.COMCOM.2024.03.017},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/ZhuLLGWY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ZouCLWXMCX24,
  author       = {Shihong Zou and
                  Qiang Cao and
                  Ruichao Lu and
                  Chenyu Wang and
                  Guoai Xu and
                  Huanhuan Ma and
                  Yingyi Cheng and
                  Jinwen Xi},
  title        = {A robust and effective 3-factor authentication protocol for smart
                  factory in IIoT},
  journal      = {Comput. Commun.},
  volume       = {220},
  pages        = {81--93},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comcom.2024.04.011},
  doi          = {10.1016/J.COMCOM.2024.04.011},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/ZouCLWXMCX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics