Policy-Based Privacy-Preserving Scheme for Primary Users in Database-Driven Cognitive Radio Networks
暂无分享,去创建一个
[1] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[2] Behnam Bahrak,et al. Security and Enforcement in Spectrum Sharing , 2014, Proceedings of the IEEE.
[3] Behnam Bahrak,et al. Protecting the primary users' operational privacy in spectrum sharing , 2014, 2014 IEEE International Symposium on Dynamic Spectrum Access Networks (DYSPAN).
[4] Jiming Chen,et al. Dynamic Channel Assignment for Wireless Sensor Networks: A Regret Matching Based Approach , 2015, IEEE Transactions on Parallel and Distributed Systems.
[5] Yang Cui,et al. Protocol to Access White Space Database:Security Considerations , 2012 .
[6] Kazuki Yoneyama,et al. Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures , 2008, ACNS.
[7] Peng Cheng,et al. Achieving Bilateral Utility Maximization and Location Privacy Preservation in Database-Driven Cognitive Radio Networks , 2015, 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems.
[8] Zhenfu Cao,et al. Location privacy in database-driven Cognitive Radio Networks: Attacks and countermeasures , 2013, 2013 Proceedings IEEE INFOCOM.
[9] Jeffrey Boksiner,et al. Spectrum Database Poisoning for Operational Security in Policy-Based Spectrum Operations , 2013, MILCOM 2013 - 2013 IEEE Military Communications Conference.
[10] Stefan Katzenbeisser,et al. Hiding the Policy in Cryptographic Access Control , 2011, STM.