Abstract is missing.
- On the Use of a Virtualized 5G Core for Time Critical Communication in Smart GridVan Giang Nguyen, Karl-Johan Grinnemo, Jun Cheng, Javid Taheri, Anna Brunström. 1-8 [doi]
- DewROS: A Platform for Informed Dew Robotics in ROSGiovanni Stanco, Alessio Botta, Giorgio Ventre. 9-16 [doi]
- Bloccess: Towards Fine-Grained Access Control Using Blockchain in a Distributed Untrustworthy EnvironmentYepeng Ding, Hiroyuki Sato. 17-22 [doi]
- Mobile Energy Requirements of the Upcoming NIST Post-Quantum Cryptography StandardsMarkku-Juhani Saarinen. 23-30 [doi]
- Game Theoretic Algorithm for Energy Efficient Mobile Edge Computing with Multiple Access PointsTobias Mahn, Maximilian Wirth, Anja Klein 0002. 31-38 [doi]
- Drone-Assisted Fog-Cloud IoT Content Service Platform for Rural CommunitiesJuan Li, Shadi Alian, Maryam Sadat Amiri Tehrani Zadeh, Bikesh Maharjan, Yan Bai. 39-46 [doi]
- Participant Comfort Adaptation in Dependable Mobile Crowdsensing ServicesVenkat Surya Dasari, Murat Simsek, Burak Kantarci. 47-54 [doi]
- Docker Container Deployment in Distributed Fog Infrastructures with Checkpoint/RestartArif Ahmed 0001, Apoorve Mohan, Gene Cooperman, Guillaume Pierre. 55-62 [doi]
- Cross-Site Edge Framework for Location-Awareness Distributed Edge-Computing ApplicationsYu Nakata, Mayuko Takai, Hiroaki Konoura, Masafumi Kinoshita. 63-68 [doi]
- Elastic Function Chain Control for Edge Networks under Reconfiguration Delay and QoS RequirementsMichele Berno, Flavio Esposito, Michele Rossi. 69-76 [doi]
- Scalable and Efficient Mutual Authentication Strategy in Fog ComputingJatna Bavishi, Mohammed Saad Shaikh, Reema Patel. 77-83 [doi]
- Global and Secured UAV Authentication System based on Hardware-SecurityDominic Pirker, Thomas Fischer, Christian H. Lesjak, Christian Steger. 84-89 [doi]
- Self-Sovereign Identity Specifications: Govern Your Identity Through Your Digital Wallet using Blockchain TechnologyNitin Naik, Paul Jenkins. 90-95 [doi]