Privacy Preserving Security Framework for Cognitive Radio Networks
暂无分享,去创建一个
[1] Ian F. Akyildiz,et al. CRAHNs: Cognitive radio ad hoc networks , 2009, Ad Hoc Networks.
[2] Alexandros G. Fragkiadakis,et al. A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.
[3] Himanshu Katiyar,et al. Cooperative Communication: A Review , 2011 .
[4] Li Zhu,et al. An Investigation on Security of Cognitive Radio Networks , 2011, 2011 International Conference on Management and Service Science.
[5] Hyun Sung Kim,et al. Location-based authentication protocol for first cognitive radio networking standard , 2011, J. Netw. Comput. Appl..
[6] Zhoujun Li,et al. An efficient and non-interactive hierarchical key agreement protocol , 2011, Comput. Secur..
[7] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[8] Qusay H. Mahmoud,et al. Cognitive Networks: Towards Self-Aware Networks , 2007 .
[9] Joseph Mitola,et al. Cognitive Radio An Integrated Agent Architecture for Software Defined Radio , 2000 .
[10] Timothy X. Brown,et al. Potential Cognitive Radio Denial-of-Service Vulnerabilities and Protection Countermeasures: a Multi-dimensional Analysis and Assessment , 2008, Mob. Networks Appl..
[11] Jin Li,et al. Optimal Frequency-time Allocation in Cognitive Radio Wireless Mesh Networks , 2011 .
[12] N.R. Prasad. Secure Cognitive Networks , 2008, 2008 European Conference on Wireless Technology.
[13] Zhongding Lei,et al. IEEE 802.22: The first cognitive radio wireless regional area network standard , 2009, IEEE Communications Magazine.
[14] Shuai Li,et al. Security and privacy of collaborative spectrum sensing in cognitive radio networks , 2012, IEEE Wireless Communications.
[15] Song Han,et al. Cognitive radio network security: A survey , 2012, J. Netw. Comput. Appl..
[16] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[17] John M. Acken,et al. A Cross Section of the Issues and Research Activities Related to Both Information Security and Cloud Computing , 2011 .