Ultra-secure transmissions for 5G-V2X communications
暂无分享,去创建一个
[1] Geoffrey Ye Li,et al. Non-Orthogonal Multiple Access for High-Reliable and Low-Latency V2X Communications in 5G Systems , 2017, IEEE Journal on Selected Areas in Communications.
[2] Shahid Mumtaz,et al. Millimeter-Wave Massive MIMO Communication for Future Wireless Systems: A Survey , 2018, IEEE Communications Surveys & Tutorials.
[3] Li Zhao,et al. Vehicle-to-Everything (v2x) Services Supported by LTE-Based Systems and 5G , 2017, IEEE Communications Standards Magazine.
[4] Mate Boban,et al. Design aspects for 5G V2X physical layer , 2016, 2016 IEEE Conference on Standards for Communications and Networking (CSCN).
[5] Gaoxiang Zhang,et al. Toward Secure Crowd Sensing in Vehicle-to-Everything Networks , 2018, IEEE Network.
[6] Xianbin Wang,et al. SDN Enabled 5G-VANET: Adaptive Vehicle Clustering and Beamformed Transmission for Aggregated Traffic , 2017, IEEE Communications Magazine.
[7] Tanesh Kumar,et al. 5G security: Analysis of threats and solutions , 2017, 2017 IEEE Conference on Standards for Communications and Networking (CSCN).
[8] Qi Shi,et al. Secure and Privacy-Aware Cloud-Assisted Video Reporting Service in 5G-Enabled Vehicular Networks , 2016, IEEE Transactions on Vehicular Technology.
[9] Hanwen Cao,et al. A Testbed for Experimenting 5G-V2X Requiring Ultra Reliability and Low-Latency , 2017, WSA.
[10] Ghada Arfaoui,et al. Security and Resilience in 5G: Current Challenges and Future Directions , 2017, 2017 IEEE Trustcom/BigDataSE/ICESS.
[11] Ben-Jye Chang,et al. Efficient Emergency Forwarding to Prevent Message Broadcasting Storm in Mobile Society via Vehicle-to-X Communications for 5G LTE-V , 2016, 2016 International Computer Symposium (ICS).
[12] Mihai Dimian,et al. Toward Environmental-Adaptive Visible Light Communications Receivers for Automotive Applications: A Review , 2016, IEEE Sensors Journal.
[13] F. J. Alvarez,et al. Characterization of the Near-Far problem in a CDMA-based acoustic localization system , 2015, 2015 IEEE International Conference on Industrial Technology (ICIT).
[14] Quanyan Zhu,et al. PHY-layer location privacy-preserving access point selection mechanism in next-generation wireless networks , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).
[15] Christian Waldschmidt,et al. Wireless channel-based message authentication , 2015, 2015 IEEE Vehicular Networking Conference (VNC).
[16] Jari Arkko,et al. Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA) , 2006, RFC.
[17] Rose Qingyang Hu,et al. Security for 5G Mobile Wireless Networks , 2018, IEEE Access.
[18] Geoffrey Ye Li,et al. NOMA-Based Low-Latency and High-Reliable Broadcast Communications for 5G V2X Services , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[19] Ramjee Prasad,et al. Securing communication in inter domains Internet of Things using identity-based cryptography , 2017, 2017 International Workshop on Big Data and Information Security (IWBIS).
[20] Ahmed Serhrouchni,et al. Identity-based cryptography (IBC) based key management system (KMS) for industrial control systems (ICS) , 2017, 2017 1st Cyber Security in Networking Conference (CSNet).