Massive machine-type communication (mMTC) access with integrated authentication
暂无分享,去创建一个
[1] David C. Chu,et al. Polyphase codes with good periodic correlation properties (Corresp.) , 1972, IEEE Trans. Inf. Theory.
[2] Petar Popovski,et al. Assessment of LTE Wireless Access for Monitoring of Energy Distribution in the Smart Grid , 2015, IEEE Journal on Selected Areas in Communications.
[3] Petar Popovski,et al. Random Access for Machine-Type Communication Based on Bloom Filtering , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[4] Carsten Bockelmann,et al. Massive machine-type communications in 5g: physical and MAC-layer solutions , 2016, IEEE Communications Magazine.
[5] Valtteri Niemi,et al. Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems , 2015, NDSS.
[6] Kae Won Choi,et al. Hybrid Random Access and Data Transmission Protocol for Machine-to-Machine Communications in Cellular Networks , 2015, IEEE Transactions on Wireless Communications.
[7] Christopher Thompson,et al. Breaking Cell Phone Authentication: Vulnerabilities in AKA, IMS, and Android , 2013, WOOT.
[8] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[9] Petar Popovski,et al. Massive M2M access with reliability guarantees in LTE systems , 2015, 2015 IEEE International Conference on Communications (ICC).
[10] Petar Popovski,et al. Code‐expanded radio access protocol for machine‐to‐machine communications , 2013, Trans. Emerg. Telecommun. Technol..
[11] Valtteri Niemi,et al. Cellular Authentication for Mobile and Internet Services , 2008 .
[12] Sasu Tarkoma,et al. Theory and Practice of Bloom Filters for Distributed Systems , 2012, IEEE Communications Surveys & Tutorials.