-
1
-
-
0033171330
-
Cognitive radio: Making software radios more personal
-
Aug
-
J. Mitola III and G.Q. Maguire Jr., "Cognitive radio: making software radios more personal," IEEE Personal Commun. Mag., vol. 6, no. 4, pp. 13-18, Aug 1999.
-
(1999)
IEEE Personal Commun. Mag.
, vol.6
, Issue.4
, pp. 13-18
-
-
Mitola III, J.1
Maguire Jr., G.Q.2
-
2
-
-
60149086999
-
In-band spectrum sensing in cognitive radio networks: Energy detection or feature detection?
-
San Francisco, California, USA, Sep.
-
H. Kim and K.G. Shin, "In-band spectrum sensing in cognitive radio networks: energy detection or feature detection?," in Proc. of the 14th ACM int. conf. on Mobile computing and networking, San Francisco, California, USA, Sep. 2008.
-
(2008)
Proc. of the 14th ACM Int. Conf. on Mobile Computing and Networking
-
-
Kim, H.1
Shin, K.G.2
-
3
-
-
38549087951
-
DVB detector for cognitive radio
-
Glasgow, Scotland, Jun.
-
L.P. Goh, Z. Lei, and F. Chin, "DVB Detector for Cognitive Radio," in Proc. IEEE Int. Conf. on Commun., Glasgow, Scotland, Jun. 2007.
-
(2007)
Proc. IEEE Int. Conf. on Commun.
-
-
Goh, L.P.1
Lei, Z.2
Chin, F.3
-
4
-
-
64549087630
-
Cyclostationarity-based spectrum sensing for wideband cognitive radio
-
Kunming, Yunnan, China, Jan.
-
Q. Yuan, P. Tao, W. Wang, and R. Qian, "Cyclostationarity-Based Spectrum Sensing for Wideband Cognitive Radio," in Proc. WRI Int. Conf. on Commun. and Mobile Computing, Kunming, Yunnan, China, Jan. 2009.
-
(2009)
Proc. WRI Int. Conf. on Commun. and Mobile Computing
-
-
Yuan, Q.1
Tao, P.2
Wang, W.3
Qian, R.4
-
5
-
-
38149111701
-
Ensuring trustworthy spectrum sensing in cognitive radio networks
-
Reston, VA, USA, Sep.
-
R. Chen and J.M. Park, "Ensuring trustworthy spectrum sensing in cognitive radio networks," in Proc. 1st IEEE Workshop Netw. Technol. Software Define Radio Netw., Reston, VA, USA, Sep. 2006.
-
(2006)
Proc. 1st IEEE Workshop Netw. Technol. Software Define Radio Netw.
-
-
Chen, R.1
Park, J.M.2
-
6
-
-
39449137863
-
Physical-layer authentication
-
P. Yu, J.S. Baras, and B.M. Sadler, "Physical-layer authentication," IEEE Trans. Inf. Forensics Security, vol. 3, no. 1, pp. 38-51, 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.1
, pp. 38-51
-
-
Yu, P.1
Baras, J.S.2
Sadler, B.M.3
-
7
-
-
80051914579
-
Cryptographic link signatures for spectrum usage authentication in cognitive radio
-
Hamburg, Germany, Jun.
-
X. Tan, K. Borle, W. Du, and B. Chen, "Cryptographic link signatures for spectrum usage authentication in cognitive radio," in Proc. of the fourth ACM conf. on Wireless network security, Hamburg, Germany, Jun. 2011.
-
(2011)
Proc. of the Fourth ACM Conf. on Wireless Network Security
-
-
Tan, X.1
Borle, K.2
Du, W.3
Chen, B.4
-
8
-
-
0004026002
-
-
Morgan Kaufman, San Francisco, CA
-
I. Cox, M. Miller, J. Bloom, and C. Honsinger, Digital Watermarking, Morgan Kaufman, San Francisco, CA, 2001.
-
(2001)
Digital Watermarking
-
-
Cox, I.1
Miller, M.2
Bloom, J.3
Honsinger, C.4
-
9
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport, "Password authentication with insecure communication," Commun. of the ACM, vol. 24, no. 11, pp. 770-772, 1981.
-
(1981)
Commun. of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
12
-
-
84877603235
-
-
Spring (Massachusetts Institute of Technology: MIT OpenCourseWare), (Accessed Oct 10, 2012). License: Creative Commons BYNC-SA
-
D. Forney, "6.451 Principles of Digital Communication II, Spring 2005," (Massachusetts Institute of Technology: MIT OpenCourseWare), http://ocw.mit.edu (Accessed Oct 10, 2012). License: Creative Commons BYNC-SA.
-
(2005)
6.451 Principles of Digital Communication II
-
-
Forney, D.1
|