Digital signature-based authentication framework in cognitive radio networks
暂无分享,去创建一个
[1] T. Charles Clancy,et al. Security in Cognitive Radio Networks: Threats and Mitigation , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).
[2] Fang Yong,et al. A Novel Authentication Scheme Based on Trust-value Updated Model in Adhoc Network , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).
[3] Ying-Chang Liang,et al. Cognitive radio network architecture: part II -- trusted network layer structure , 2008, ICUIMC '08.
[4] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[5] Cheng Li,et al. The security in cognitive radio networks: a survey , 2009, IWCMC.
[6] Farookh Khadeer Hussain,et al. Digital Signature-Based Secure Communication in Cognitive Radio Networks , 2011, 2011 International Conference on Broadband and Wireless Computing, Communication and Applications.
[7] Chittabrata Ghosh,et al. Secure Communication in Cognitive Radio Networks , 2022 .
[8] Zenon Chaczko,et al. Security threats in Cognitive Radio applications , 2010, 2010 IEEE 14th International Conference on Intelligent Engineering Systems.
[9] Joseph Mitola,et al. Cognitive Radio An Integrated Agent Architecture for Software Defined Radio , 2000 .
[10] Yuan Zhang,et al. Security Threats in Cognitive Radio Networks , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.
[11] Simon Haykin,et al. Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.
[12] Roy H. Campbell,et al. Dynamic access control: preserving safety and trust for network defense operations , 2003, SACMAT '03.
[13] Yiwei Thomas Hou,et al. Toward secure distributed spectrum sensing in cognitive radio networks , 2008, IEEE Communications Magazine.
[14] Song Han,et al. Trust-Based Authentication for Secure Communication in Cognitive Radio Networks , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[15] Miguel Soriano,et al. Securing cognitive radio networks , 2010 .
[16] Ben-Jye Chang,et al. Markov Chain-Based Trust Model for Analyzing Trust Value in Distributed Multicasting Mobile Ad Hoc Networks , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.
[17] Song Han,et al. Towards Trust Establishment for Spectrum Selection in Cognitive Radio Networks , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[18] Máire O'Neill,et al. Common Control Channel Security Framework for Cognitive Radio Networks , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.
[19] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[20] Miguel Soriano,et al. Securing cognitive radio networks , 2010, Int. J. Commun. Syst..
[21] Bruce Schneier,et al. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .
[22] K. P. Subbalakshmi,et al. Digital Signatures for Centralized DSA Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.