Communications and Networking: 11th EAI International Conference, ChinaCom 2016 Chongqing, China, September 24–26, 2016, Proceedings, Part II
暂无分享,去创建一个
[1] Chung-Ju Chang,et al. Modeling and Analysis for Spectrum Handoffs in Cognitive Radio Networks , 2012, IEEE Transactions on Mobile Computing.
[2] Joseph Mitola,et al. Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..
[3] T. Aaron Gulliver,et al. A Secure Code Based Cryptosystem via Random Insertions, Deletions, and Errors , 2016, IEEE Communications Letters.
[4] Mohsen Guizani,et al. Analyzing Cognitive Network Access Efficiency Under Limited Spectrum Handoff Agility , 2014, IEEE Transactions on Vehicular Technology.
[5] Karthika Viswanath,et al. Cryptocoding system based on AES and concatenated coding scheme involving BCH and QC-LDPC , 2015, 2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT).
[6] Sri Parameswaran,et al. Advanced modes in AES: Are they safe from power analysis based side channel attacks? , 2014, 2014 IEEE 32nd International Conference on Computer Design (ICCD).
[7] Yu Kou,et al. Low Density Parity Check Codes Based on Finite Geometries: A Rediscovery and More , 1999 .
[8] Chung-Ju Chang,et al. Optimal Target Channel Sequence Design for Multiple Spectrum Handoffs in Cognitive Radio Networks , 2012, IEEE Transactions on Communications.
[9] Masoumeh Nasiri-Kenari,et al. Optimal Probabilistic Initial and Target Channel Selection for Spectrum Handoff in Cognitive Radio Networks , 2015, IEEE Transactions on Wireless Communications.
[10] Joseph Mitola,et al. Cognitive Radio An Integrated Agent Architecture for Software Defined Radio , 2000 .
[11] Luminita Scripcariu,et al. A study of methods used to improve encryption algorithms robustness , 2015, 2015 International Symposium on Signals, Circuits and Systems (ISSCS).
[12] Jian-Hong Chen,et al. Reconfigurable system for high-speed and diversified AES using FPGA , 2007, Microprocess. Microsystems.
[13] V. Fischer,et al. Countermeasure against the SPA attack on an embedded McEliece cryptosystem , 2015, 2015 25th International Conference Radioelektronika (RADIOELEKTRONIKA).
[14] T. Mattfeldt. Stochastic Geometry and Its Applications , 1996 .
[15] Ajoy Kumar Khan,et al. Side channel attacks and their mitigation techniques , 2014, 2014 First International Conference on Automation, Control, Energy and Systems (ACES).
[16] Min Wang,et al. A method for pico-specific upper bound CRE bias setting in HetNet , 2013, 2013 IEEE Wireless Communications and Networking Conference Workshops (WCNCW).
[17] Jian-Hong Chen,et al. Diversified Mixcolumn transformation of AES , 2007, 2007 6th International Conference on Information, Communications & Signal Processing.