Authorization based on mobile whitelist in devices for device-to-device communications
暂无分享,去创建一个
[1] Sherali Zeadally,et al. Intelligent Device-to-Device Communication in the Internet of Things , 2016, IEEE Systems Journal.
[2] Qing Wang,et al. A Survey on Device-to-Device Communication in Cellular Networks , 2013, IEEE Communications Surveys & Tutorials.
[3] Jörg Ott,et al. Security and Privacy in Device-to-Device (D2D) Communication: A Review , 2017, IEEE Communications Surveys & Tutorials.
[4] Giovanni Stea,et al. Simulating device-to-device communications in OMNeT++ with SimuLTE: scenarios and configurations , 2016, ArXiv.
[5] HoonJae Lee,et al. A Lightweight Secure iSCSI-based Remote Storage Service for Mobile Devices , 2007, 2007 Second International Conference on Communications and Networking in China.
[6] Abdullahi Arabo. Mobile App Collusions and Its Cyber Security Implications , 2016, 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud).
[7] Engy M. Maher,et al. Device-to-Device Communication Distance Analysis in Interference Limited Cellular Networks , 2013, ISWCS.
[8] Nei Kato. On device-to-device (D2D) communication [Editor's note] , 2016, IEEE Netw..
[9] George Kornaros,et al. Towards Trusted Apps platforms for open CPS , 2016, 2016 3rd International Workshop on Emerging Ideas and Trends in Engineering of Cyber-Physical Systems (EITEC).
[10] Himanshu Pareek. Application Whitelisting: Approaches and Challenges , 2012 .
[11] Karim O. Elish,et al. On the Need of Precise Inter-App ICC Classification for Detecting Android , 2015 .
[12] Dave Evans,et al. How the Next Evolution of the Internet Is Changing Everything , 2011 .
[13] Halim Yanikomeroglu,et al. Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions , 2014, IEEE Communications Magazine.