Achieving 5As in Cloud Centric Cognitive Cellular Networks
暂无分享,去创建一个
[1] Glen Zorn,et al. Diameter Extensible Authentication Protocol (EAP) Application , 2005, RFC.
[2] Makis Stamatelatos,et al. The METIS 5G Architecture: A Summary of METIS Work on 5G Architectures , 2015, 2015 IEEE 81st Vehicular Technology Conference (VTC Spring).
[3] Bala Srinivasan,et al. Flexible Authentication Technique for Ubiquitous Wireless Communication using Passport and Visa Tokens , 2010, ArXiv.
[4] Lein Harn,et al. Group Authentication , 2013, IEEE Transactions on Computers.
[5] Victor Fajardo,et al. Diameter Base Protocol , 2003, RFC.
[6] Madjid Nakhjiri,et al. AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility , 2005 .
[7] Xuemin Shen,et al. Deploying cognitive cellular networks under dynamic resource management , 2013, IEEE Wireless Communications.
[8] Brian M. Sadler,et al. A Survey of Dynamic Spectrum Access , 2007, IEEE Signal Processing Magazine.
[9] Bin Xiao. Autonomic and Trusted Computing, 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings , 2007, ATC.
[10] Yi Sun,et al. Trust-Based Fast Authentication for Mobile IPv6 Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[11] Michael Roe,et al. Reducing Reauthentication Delay in Wireless Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[12] A. Wolisz,et al. Primary Users in Cellular Networks: A Large-Scale Measurement Study , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[13] Thomas Martin Knoll. Life-cycle cost modelling for NFV/SDN based mobile networks , 2015, 2015 Conference of Telecommunication, Media and Internet Techno-Economics (CTTE).
[14] Jon M. Peha,et al. Real-Time Secondary Markets for Spectrum , 2003 .
[15] Mark Jones,et al. The Diameter 'Application Bridging for Federated Access Beyond Web (ABFAB)' Application , 2012 .
[16] Harish Viswanathan,et al. Group authentication: A new paradigm for emerging applications , 2012, Bell Labs Technical Journal.
[17] Elisa Bertino,et al. Identity Management: Concepts, Technologies, and Systems , 2010 .
[18] C-ran the Road towards Green Ran , 2022 .