Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             15 results found
no title author magazine year volume issue page(s) type
1 A dynamic data access control scheme for hierarchical structures in big data Deng, Xinxin

220 C p. 128-137
article
2 A robust and effective 3-factor authentication protocol for smart factory in IIoT Zou, Shihong

220 C p. 81-93
article
3 Corrigendum to ‘A novel hardware efficient design for IEEE 802.11ax compliant OFDMA transceiver’ [Comput. Commun. 219 (2024) 173–181] Aslam, Muhammad

220 C p. 64
article
4 Detecting abnormal behaviors in smart contracts using opcode sequences Li, Peiqiang

220 C p. 12-22
article
5 DRAMS: Double-RIS assisted multihop routing scheme for device-to-device communication Sau, Lakshmikanta

220 C p. 52-63
article
6 Editorial Board
220 C p. ii-iii
article
7 Heterogeneous signcryption scheme with equality test from CLC to PKI for IoV Jin, Chunhua

220 C p. 149-159
article
8 Impact of cybersecurity awareness on mobile malware propagation: A dynamical model Zhu, Qingyi

220 C p. 1-11
article
9 Learning-driven Continuous Diagnostics and Mitigation program for secure edge management through Zero-Trust Architecture SumanPrakash, P.

220 C p. 94-107
article
10 Learning to optimize power allocation in cell-free massive MIMO networks with hybrid green energy Moradi, Farzad

220 C p. 108-127
article
11 LFTDA: A lightweight and fault-tolerant data aggregation scheme with privacy-enhanced property in fog-assisted smart grid Wang, Zhong

220 C p. 35-42
article
12 Low-cost fuzzing drone control system for configuration errors threatening flight safety in edge terminals Chang, Zhiwei

220 C p. 138-148
article
13 PrioMQTT: A prioritized version of the MQTT protocol Patti, Gaetano

220 C p. 43-51
article
14 Privacy-preserving and verifiable classifier training in edge-assisted mobile communication systems Wang, Chen

220 C p. 65-80
article
15 Secrecy Enhancement of relay cooperative NOMA network based on user behavior Song, Xin

220 C p. 23-34
article
                             15 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands