-
1
-
-
33749080732
-
IEEE 802.22: The first worldwide wireless standard based on cognitive radios
-
C, Cordeiro., K, Challapali., D, Birru., and N, Shankar. (2005) "IEEE 802.22: The first worldwide wireless standard based on cognitive radios", in New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005. First IEEE International Symposium on, 2005, pp. 328-337
-
(2005)
New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005. First IEEE International Symposium on, 2005
, pp. 328-337
-
-
Cordeiro, C.1
Challapali, K.2
Birru, D.3
Shankar, N.4
-
2
-
-
78650886567
-
Cognitive radios for dynamic spectrum access: From concept to reality
-
K, Shin., H, Kim., A, Min., and A, Kumar. (2010) "Cognitive radios for dynamic spectrum access: from concept to reality", Wireless Communications, IEEE, vol. 17, no. 6. pp. 64-74.
-
(2010)
Wireless Communications, IEEE
, vol.17
, Issue.6
, pp. 64-74
-
-
Shin, K.1
Kim, H.2
Min, A.3
Kumar, A.4
-
3
-
-
84866740849
-
Impact of primary user emulation attacks on dynamic spectrum access networks
-
Z, Jin., S, Anand., and K, Subbalakshmi. (2012) "Impact of Primary User Emulation Attacks on Dynamic Spectrum Access Networks", Communications, IEEE Transactions on, vol. 60, no. 9, pp. 2635-2643.
-
(2012)
Communications, IEEE Transactions on
, vol.60
, Issue.9
, pp. 2635-2643
-
-
Jin, Z.1
Anand, S.2
Subbalakshmi, K.3
-
4
-
-
84867826511
-
Defeating primary user emulation attacks using belief propagation in cognitive radio networks
-
Z, Yuan., D, Niyato., H, Li., J, Song., and Z, Han. (2012) "Defeating Primary User Emulation Attacks Using Belief Propagation in Cognitive Radio Networks", Selected Areas in Communications, IEEE Journal on, vol. 30, no, 10, pp. 1850-1860.
-
(2012)
Selected Areas in Communications, IEEE Journal on
, vol.30
, Issue.10
, pp. 1850-1860
-
-
Yuan, Z.1
Niyato, D.2
Li, H.3
Song, J.4
Han, Z.5
-
5
-
-
70450245333
-
The security in cognitive radio networks: A survey
-
Leipzig, Germany
-
X, Zhang. and C, Li. (2009) "The security in cognitive radio networks: A survey", in IWCMC'09:Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, Leipzig, Germany, pp. 21-24.
-
(2009)
IWCMC'09: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
, pp. 21-24
-
-
Zhang, X.1
Li, C.2
-
6
-
-
84860761341
-
Cognitive radio network as wireless sensor network (II): Security consideration
-
F, Lin., Z, Hu., S, Hou., J, Yu., C, Zhang., N, Guo., M, Wicks., R, Qiu., and K, Currie. (2011) "Cognitive radio network as wireless sensor network (II): Security consideration", in Aerospace and Electronics Conference (NAECON), Proceedings of the 2011 IEEE National, pp. 324-328.
-
(2011)
Aerospace and Electronics Conference (NAECON), Proceedings of the 2011 IEEE National
, pp. 324-328
-
-
Lin, F.1
Hu, Z.2
Hou, S.3
Yu, J.4
Zhang, C.5
Guo, N.6
Wicks, M.7
Qiu, R.8
Currie, K.9
-
7
-
-
84892549936
-
-
April 2012
-
L, Tang. and, J, Wu. (2012) "Research and Analysis on Cognitive Radio Network Security", April 2012, vol. 4, pp. 120-126.
-
(2012)
Research and Analysis on Cognitive Radio Network Security
, vol.4
, pp. 120-126
-
-
Tang, L.1
Wu, J.2
-
8
-
-
38149046958
-
Defense against primary user emulation attacks in cognitive radio networks
-
R. Chen., J, Park,. and, J. Reed. (2008) "Defense against Primary User Emulation Attacks in Cognitive Radio Networks", Selected Areas in Communications, IEEE Journal on, vol. 26, no. 1, pp. 25-37
-
(2008)
Selected Areas in Communications, IEEE Journal on
, vol.26
, Issue.1
, pp. 25-37
-
-
Chen, R.1
Park, J..2
Reed, J.3
-
10
-
-
84892501240
-
Identity-based authentication and access control in wireless sensor networks
-
March 2012
-
A, Al-Mahmud., and M, Morogan. (2012) "Identity-based Authentication and Access Control in Wireless Sensor Networks", International Journal of Computer Applications, vol 4, no. 13, March 2012.
-
(2012)
International Journal of Computer Applications
, vol.4
, Issue.13
-
-
Al-Mahmud, A.1
Morogan, M.2
-
11
-
-
33744500243
-
Anatomy and performance of SSL processing
-
20-22 March 2005
-
L, Zhao., R, Iyer., S, Makineni., and L, Bhuyan. (2005) "Anatomy and Performance of SSL Processing", Performance Analysis of Systems and Software, 2005. ISPASS 2005. IEEE International Symposium on, pp. 197-206, 20-22 March 2005
-
(2005)
Performance Analysis of Systems and Software, 2005. ISPASS 2005. IEEE International Symposium on
, pp. 197-206
-
-
Zhao, L.1
Iyer, R.2
Makineni, S.3
Bhuyan, L.4
-
12
-
-
79960556311
-
Generalized digital certificate for user authentication and key establishment for secure communications
-
July 2011
-
L, Harn., and R, Jian. (2011) "Generalized Digital Certificate for User Authentication and Key Establishment for Secure Communications", Wireless Communications, IEEE Transactions on, vol. 10, no. 7, pp. 2372-2379, July 2011
-
(2011)
Wireless Communications, IEEE Transactions on
, vol.10
, Issue.7
, pp. 2372-2379
-
-
Harn, L.1
Jian, R.2
-
13
-
-
74049146968
-
A digital certificate application scheme in content protection system for high definition digital interface
-
18-20 Aug. 2009
-
F, Kefeng., Z, Subing, and M, Wei. (2009) "A Digital Certificate Application Scheme in Content Protection System for High Definition Digital Interface", Information Assurance and Security, 2009. IAS'09. Fifth International Conference on, vol. 2, pp. 395-398, 18-20 Aug. 2009
-
(2009)
Information Assurance and Security, 2009. IAS'09. Fifth International Conference on
, vol.2
, pp. 395-398
-
-
Kefeng, F.1
Subing, Z.2
Wei, M.3
-
15
-
-
0017018484
-
New directions in cryptography
-
Nov 1976
-
W, Diffie., M, Hellman., (1976) "New directions in cryptography", Information Theory, IEEE Transactions on, vol. 22, no. 6, pp. 644-654, Nov. 1976
-
(1976)
Information Theory, IEEE Transactions on
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
16
-
-
74049152238
-
Security analysis of the kerberos protocol using BAN logic
-
470, 18-20 Aug. 2009
-
F, Kai., L, Hui., and W, Yue. (2009) "Security Analysis of the Kerberos Protocol Using BAN Logic", Information Assurance and Security, 2009. IAS'09. Fifth International Conference on, vol. 2, pp. 467, 470, 18-20 Aug. 2009
-
(2009)
Information Assurance and Security, 2009. IAS'09. Fifth International Conference on
, vol.2
, pp. 467
-
-
Kai, F.1
Hui, L.2
Yue, W.3
-
17
-
-
79951624756
-
Research on authentication mechanism of cognitive radio networks based on certification authority
-
L, Zhu., and H, Mao. (2010) "Research on authentication mechanism of cognitive radio networks based on certification authority", in Computational Intelligence and Software Engineering (CiSE), 2010 International Conference on, 2010, pp. 1-5
-
(2010)
Computational Intelligence and Software Engineering (CiSE), 2010 International Conference on, 2010
, pp. 1-5
-
-
Zhu, L.1
Mao, H.2
-
18
-
-
84855833027
-
Digital signature-based secure communication in cognitive radio networks
-
S, Parvin., and F, Hussain. (2011) "Digital signature-based secure communication in cognitive radio networks", in Broadband and Wireless Computing, Communication and Applications (BWCCA), 2011 International Conference on, pp. 230-235
-
(2011)
Broadband and Wireless Computing, Communication and Applications (BWCCA), 2011 International Conference on
, pp. 230-235
-
-
Parvin, S.1
Hussain, F.2
-
19
-
-
79951795876
-
Trust-based authentication for secure communication in cognitive radio networks
-
S, Parvin., S, Han., B, Tian., and F, Hussain. (2010) "Trust-based authentication for secure communication in cognitive radio networks", in Embedded and Ubiquitous Computing (EUC), 2010 IEEE/IFIP 8th International Conference on, 2010, pp. 589-596
-
(2010)
Embedded and Ubiquitous Computing (EUC), 2010 IEEE/IFIP 8th International Conference on, 2010
, pp. 589-596
-
-
Parvin, S.1
Han, S.2
Tian, B.3
Hussain, F.4
-
20
-
-
79955984464
-
Trust based security for cognitive radio networks
-
S, Parvin., S, Han., F, Hussain., and M, Al Faruque. (2010) "Trust based security for cognitive radio networks" in IiWAS'10 Proceedings of the 12th International Conference on Information Integration and Web-Based & Services, 2010, pp. 743-748
-
(2010)
IiWAS'10 Proceedings of the 12th International Conference on Information Integration and Web-Based & Services, 2010
, pp. 743-748
-
-
Parvin, S.1
Han, S.2
Hussain, F.3
Al Faruque, M.4
-
21
-
-
58049118486
-
Augmented security in IEEE 802.22 MAC layer protocol
-
R, Shaukat., S, Khan., and A, Ahmed. (2008) "Augmented security in IEEE 802.22 MAC layer protocol", in Wireless Communications, Networking and Mobile Computing, 2008. WiCOM'08. 4th International Conference, pp. 1-4
-
(2008)
Wireless Communications, Networking and Mobile Computing, 2008. WiCOM'08. 4th International Conference
, pp. 1-4
-
-
Shaukat, R.1
Khan, S.2
Ahmed, A.3
-
22
-
-
0025386404
-
A logic of authentication
-
1990
-
M. Burrows, M. Abadi and R. Needham (1990) "A logic of authentication", ACM transactions on computer systems. vol 8, no 1, 1990, pp. 18-36
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
|