[HTML][HTML] A survey on wearable technology: History, state-of-the-art and current challenges

A Ometov, V Shubina, L Klus, J Skibińska, S Saafi… - Computer Networks, 2021 - Elsevier
Technology is continually undergoing a constituent development caused by the appearance
of billions new interconnected “things” and their entrenchment in our daily lives. One of the …

Autonomous power allocation based on distributed deep learning for device-to-device communication underlaying cellular network

J Kim, J Park, J Noh, S Cho - IEEE access, 2020 - ieeexplore.ieee.org
For Device-to-device (D2D) communication of Internet-of-Things (IoT) enabled 5G system,
there is a limit to allocating resources considering a complicated interference between …

An RSA-based algorithm for secure D2D-aided multicast delivery of multimedia services

C Suraci, S Pizzi, A Molinaro, A Iera… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
To answer the sharp surge in the number of devices requiring the same multimedia content,
an effective management of group-communications (ie, multicast) in current fifth generation …

Secure D2D in 5G Cellular Networks: Architecture, Requirements and Solutions

MC Chow, M Ma - Advances in Computing, Informatics, Networking and …, 2022 - Springer
Allowing nearby mobile devices to communicate directly without relaying the data through
the conventional cellular network, device-to-device (D2D) communication is expected to …

Design of access authentication schemes in 5G wireless networks

MC Chow - 2021 - dr.ntu.edu.sg
The futuristic 5G network is designed to accommodate the increasing number of connected
devices with higher speed, lower latency, and better security. To achieve these goals, two …