Security in D2D Communications: A Review
暂无分享,去创建一个
[1] Xu Chen,et al. SYNERGY: A game-theoretical approach for cooperative key generation in wireless networks , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[2] Gary Steri,et al. Connectivity and security in a D2D communication protocol for public safety applications , 2014, 2014 11th International Symposium on Wireless Communications Systems (ISWCS).
[3] Qing Wang,et al. A Survey on Device-to-Device Communication in Cellular Networks , 2013, IEEE Communications Surveys & Tutorials.
[4] Klaus Doppler,et al. Mode Selection for Device-To-Device Communication Underlaying an LTE-Advanced Network , 2010, 2010 IEEE Wireless Communication and Networking Conference.
[5] Chuan Ma,et al. Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks , 2013, IEEE Communications Letters.
[6] Carl Wijting,et al. Device-to-device communication as an underlay to LTE-advanced networks , 2009, IEEE Communications Magazine.
[7] Junyi Li,et al. Toward proximity-aware internetworking , 2010, IEEE Wireless Communications.
[8] Hao Liang,et al. Device-to-device communication underlaying converged heterogeneous networks , 2014, IEEE Wireless Communications.
[9] Wenliang Du,et al. Cooperative Key Generation in Wireless Networks , 2012, IEEE Journal on Selected Areas in Communications.
[10] Stefan Parkvall,et al. Device-to-Device Communications for National Security and Public Safety , 2014, IEEE Access.
[11] Enrique Festijo,et al. Joint operation of routing control and group key management for 5G ad hoc D2D networks , 2014, 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS).
[12] Shaojie Tang,et al. KEEP: Fast secret key extraction protocol for D2D communication , 2014, 2014 IEEE 22nd International Symposium of Quality of Service (IWQoS).
[13] Yu Cheng,et al. Secure key establishment for Device-to-Device communications , 2014, 2014 IEEE Global Communications Conference.
[14] Mauro Conti,et al. Secure Message Delivery Games for Device-to-Device Communications , 2014, GameSec.
[15] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[16] Olav Tirkkonen,et al. Device-to-Device Communication Underlaying Cellular Communications Systems , 2009, Int. J. Commun. Netw. Syst. Sci..
[17] Sanjay Shakkottai,et al. FlashLinQ: A synchronous distributed scheduler for peer-to-peer ad hoc networks , 2010, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[18] Aiqing Zhang,et al. SeDS: Secure Data Sharing Strategy for D2D Communication in LTE-Advanced Networks , 2016, IEEE Transactions on Vehicular Technology.
[19] Xuemin Shen,et al. Operator controlled device-to-device communications in LTE-advanced networks , 2012, IEEE Wireless Communications.
[20] Yi Sun,et al. Modeling and Analysis on Access Control for Device-to-Device Communications in Cellular Network: A Network-Calculus-Based Approach , 2016, IEEE Transactions on Vehicular Technology.