A Secure and Efficient Authentication Mechanism Applied to Cognitive Radio Networks
暂无分享,去创建一个
[1] Farookh Khadeer Hussain,et al. Digital signature-based authentication framework in cognitive radio networks , 2012, MoMM '12.
[2] Jiannong Cao,et al. A dynamic user authentication scheme for wireless sensor networks , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).
[3] Pietro Crocioni. Is allowing trading enough? Making secondary markets in spectrum work , 2009 .
[4] Peng Ning,et al. Mitigating DoS attacks against broadcast authentication in wireless sensor networks , 2008, TOSN.
[5] Song Han,et al. Trust-Based Authentication for Secure Communication in Cognitive Radio Networks , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[6] Rakesh Rajbanshi. OFDM-based cognitive radio for DSA networks , 2007 .
[7] Mahmoud Khasawneh,et al. A Survey on Wi-Fi Protocols: WPA and WPA2 , 2014, SNDS.
[8] Kakali Chatterjee,et al. A Secure and Efficient Authentication Protocol in Wireless Sensor Network , 2015, Wirel. Pers. Commun..
[9] Anjali Agarwal,et al. A survey on security in Cognitive Radio networks , 2014, 2014 6th International Conference on Computer Science and Information Technology (CSIT).
[10] Wuu Yang,et al. An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[11] Wenliang Du,et al. Cryptographic link signatures for spectrum usage authentication in cognitive radio , 2011, WiSec '11.
[12] Joseph Mitola. Cognitive Radio for Flexible Mobile Multimedia Communications , 2001, Mob. Networks Appl..
[13] Sushil Jajodia,et al. LEAP - efficient security mechanisms for large-scale distributed sensor networks , 2003, SenSys.
[14] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[15] Dusit Niyato,et al. Spectrum trading in cognitive radio networks: A market-equilibrium-based approach , 2008, IEEE Wirel. Commun..
[16] Jing Zhao,et al. Robust Topology Control in Multi-Hop Cognitive Radio Networks , 2012, IEEE Transactions on Mobile Computing.
[17] Kwangjo Kim,et al. Efficient mobile sensor authentication in smart home and WPAN , 2010, IEEE Transactions on Consumer Electronics.
[18] Shabnam Sodagari,et al. An Anti-jamming Strategy for Channel Access in Cognitive Radio Networks , 2011, GameSec.
[19] Peng Ning,et al. Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures , 2010, 2010 IEEE Symposium on Security and Privacy.
[20] Mohsen Guizani,et al. Survey of Security Issues in Cognitive Radio Networks , 2011 .
[21] Norio Shiratori,et al. Kurihara Green ICT Project-Towards Symbiosis between Human's Life and Nature , 2011 .
[22] Farookh Khadeer Hussain,et al. Digital Signature-Based Secure Communication in Cognitive Radio Networks , 2011, 2011 International Conference on Broadband and Wireless Computing, Communication and Applications.
[23] Hyun Sung Kim,et al. Location-based authentication protocol for first cognitive radio networking standard , 2011, J. Netw. Comput. Appl..