LPOS: Location Privacy for Optimal Sensing in Cognitive Radio Networks
暂无分享,去创建一个
[1] Ranjan K. Mallik,et al. Cooperative Spectrum Sensing Optimization in Cognitive Radio Networks , 2008, 2008 IEEE International Conference on Communications.
[2] Ali Farhadi,et al. Using Classification to Protect the Integrity of Spectrum Measurements in White Space Networks , 2011, NDSS.
[3] Nathan Chenette,et al. Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions , 2011, CRYPTO.
[4] Gene Tsudik,et al. Diffie-Hellman key distribution extended to group communication , 1996, CCS '96.
[5] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[6] Bechir Hamdaoui,et al. Delay performance modeling and analysis in clustered cognitive radio networks , 2014, 2014 IEEE Global Communications Conference.
[7] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[8] Kang G. Shin,et al. OS-MAC: An Efficient MAC Protocol for Spectrum-Agile Wireless Networks , 2008, IEEE Transactions on Mobile Computing.
[9] Bechir Hamdaoui. Adaptive spectrum assessment for opportunistic access in cognitive radio networks , 2009, IEEE Transactions on Wireless Communications.
[10] Florian Kerschbaum,et al. Optimal Average-Complexity Ideal-Security Order-Preserving Encryption , 2014, CCS.
[11] Wen-Guey Tzeng,et al. An Efficient Solution to the Millionaires' Problem Based on Homomorphic Encryption , 2005, ACNS.
[12] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[13] Nathan Chenette,et al. Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..
[14] Essaid Sabir,et al. Data traffic‐based analysis of delay and energy consumption in cognitive radio networks with and without resource reservation , 2015, Int. J. Commun. Syst..
[15] Yong Wang,et al. The Performance of Elliptic Curve Based Group Diffie-Hellman Protocols for Secure Group Communication over Ad Hoc Networks , 2006, 2006 IEEE International Conference on Communications.
[16] Shuai Li,et al. Location privacy preservation in collaborative spectrum sensing , 2012, 2012 Proceedings IEEE INFOCOM.
[17] Shamik Sengupta,et al. Vulnerabilities in cognitive radio networks: A survey , 2013, Comput. Commun..
[18] Qian Zhang,et al. Location Privacy Preservation in Cognitive Radio Networks , 2014, SpringerBriefs in Computer Science.
[19] Mohsen Guizani,et al. Opportunistic Bandwidth Sharing Through Reinforcement Learning , 2010, IEEE Transactions on Vehicular Technology.
[20] Ian F. Akyildiz,et al. Cooperative spectrum sensing in cognitive radio networks: A survey , 2011, Phys. Commun..
[21] Rongxing Lu,et al. PDAFT: A privacy-preserving data aggregation scheme with fault tolerance for smart grid communications , 2015, Peer Peer Netw. Appl..
[22] Bechir Hamdaoui,et al. Efficient Objective Functions for Coordinated Learning in Large-Scale Distributed OSA Systems , 2013, IEEE Transactions on Mobile Computing.
[23] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[24] Essaid Sabir,et al. Green opportunistic access for cognitive radio networks: A minority game approach , 2014, 2014 IEEE International Conference on Communications (ICC).
[25] Tao Jiang,et al. Maximum channel throughput via cooperative spectrum sensing in cognitive radio networks , 2009, IEEE Transactions on Wireless Communications.