Lightweight privacy preservation for secondary users in cognitive radio networks
暂无分享,去创建一个
Xun Yi | Xu Yang | Li Xu | Ibrahim Khalil | Yali Zeng
[1] Zhu Han,et al. Coalitional Graph Games for Popular Content Distribution in Cognitive Radio VANETs , 2013, IEEE Transactions on Vehicular Technology.
[2] Bo Gao,et al. $P^{2}$ -SAS: Privacy-Preserving Centralized Dynamic Spectrum Access System , 2017, IEEE Journal on Selected Areas in Communications.
[3] Bruno Blanchet,et al. An efficient cryptographic protocol verifier based on prolog rules , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[4] Bo Gao,et al. Preserving Incumbent Users' Privacy in Exclusion-Zone-Based Spectrum Access Systems , 2017, ICDCS.
[5] Lei Zhu,et al. Protocol to Access White-Space (PAWS) Databases , 2015, RFC.
[6] Xuemin Shen,et al. An SMDP-Based Resource Allocation in Vehicular Cloud Computing Systems , 2015, IEEE Transactions on Industrial Electronics.
[7] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[8] Rong Jin,et al. Delay Analysis of Physical-Layer Key Generation in Dynamic Roadside-to-Vehicle Networks , 2017, IEEE Transactions on Vehicular Technology.
[9] Xiong Li,et al. An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks , 2016, Secur. Commun. Networks.
[10] Xun Yi,et al. An efficient privacy-preserving protocol for database-driven cognitive radio networks , 2019, Ad Hoc Networks.
[11] Farookh Khadeer Hussain,et al. Digital signature-based authentication framework in cognitive radio networks , 2012, MoMM '12.
[12] Yasir Saleem,et al. Primary radio user activity models for cognitive radio networks: A survey , 2014, J. Netw. Comput. Appl..
[13] Zhiwei Wang,et al. A privacy-preserving and accountable authentication protocol for IoT end-devices with weaker identity , 2017, Future Gener. Comput. Syst..
[14] Maode Ma,et al. An enhanced authentication protocol for WRANs in TV white space , 2015, Secur. Commun. Networks.
[15] Adam Wolisz,et al. Primary user behavior in cellular networks and implications for dynamic spectrum access , 2009, IEEE Communications Magazine.
[16] Peng Cheng,et al. Achieving Bilateral Utility Maximization and Location Privacy Preservation in Database-Driven Cognitive Radio Networks , 2015, 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems.
[17] Bin Fan,et al. Cuckoo Filter: Practically Better Than Bloom , 2014, CoNEXT.
[18] Mohamed Grissa,et al. When the hammer meets the nail: Multi-server PIR for database-driven CRN with location privacy assurance , 2017, 2017 IEEE Conference on Communications and Network Security (CNS).
[19] Ling Liu,et al. From Data Privacy to Location Privacy: Models and Algorithms , 2007, VLDB.
[20] Spiridon Bakiras,et al. Optimizing privacy-preserving DSA for mobile clients , 2017, Ad Hoc Networks.
[21] Qingqi Pei,et al. Location Privacy-Preserving Channel Allocation Scheme in Cognitive Radio Networks , 2016 .
[22] Yuguang Fang,et al. Policy-Based Privacy-Preserving Scheme for Primary Users in Database-Driven Cognitive Radio Networks , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[23] Li Xu,et al. Privacy-preserving aggregation for cooperative spectrum sensing , 2019, J. Netw. Comput. Appl..
[24] Youngju Cho,et al. A practical group blind signature scheme for privacy protection in smart grid , 2020, J. Parallel Distributed Comput..
[25] Mohammad S. Obaidat,et al. Lightweight Authentication Protocol for RFID-Enabled Systems Based on ECC , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[26] Bo Gao,et al. Incentivizing spectrum sensing in database-driven dynamic spectrum sharing , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[27] Kang G. Shin,et al. Location Privacy Protection for Smartphone Users , 2014, CCS.
[28] Mubashir Husain Rehmani,et al. Cognitive-Radio-Based Internet of Things: Applications, Architectures, Spectrum Related Functionalities, and Future Research Directions , 2017, IEEE Wireless Communications.
[29] Ming Li,et al. Privacy-Preserving Spectrum Query with Location Proofs in Database-Driven CRNs , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[30] Jing Wang,et al. Cognitive radio in 5G: a perspective on energy-spectral efficiency trade-off , 2014, IEEE Communications Magazine.
[31] Jeng-Farn Lee,et al. TEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc Networks , 2011, IEEE Systems Journal.
[32] Zhenfu Cao,et al. Location privacy in database-driven Cognitive Radio Networks: Attacks and countermeasures , 2013, 2013 Proceedings IEEE INFOCOM.
[33] Jie Wu,et al. Burstiness-Aware Resource Reservation for Server Consolidation in Computing Clouds , 2016, IEEE Transactions on Parallel and Distributed Systems.
[34] Mohamed Grissa,et al. Location Privacy Preservation in Database-Driven Wireless Cognitive Networks Through Encrypted Probabilistic Data Structures , 2017, IEEE Transactions on Cognitive Communications and Networking.
[35] Xiaohui Liang,et al. Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs , 2012, IEEE Transactions on Vehicular Technology.
[36] Xu Li,et al. A Practical Privacy Preserving Protocol in Database-Driven Cognitive Radio Networks , 2018, ACISP.
[37] Anjali Agarwal,et al. A Secure and Efficient Authentication Mechanism Applied to Cognitive Radio Networks , 2017, IEEE Access.
[38] Javad Akbari Torkestani,et al. Mobility prediction in mobile wireless networks , 2012, J. Netw. Comput. Appl..
[39] Xiong Li,et al. An elliptic curve cryptography based lightweight authentication scheme for smart grid communication , 2018, Future Gener. Comput. Syst..
[40] P. L. Montgomery. Modular multiplication without trial division , 1985 .
[41] Luigi Paura,et al. Channel availability for mobile cognitive radio networks , 2015, J. Netw. Comput. Appl..