-
1
-
-
84883454044
-
5g on the horizon: Key challenges for the radio-access network
-
IEEE
-
P. Demestichas, A. Georgakopoulos, D. Karvounas, K. Tsagkaris, V. Stavroulaki, J. Lu, C. Xiong, and J. Yao, "5G on the Horizon: Key Challenges for the Radio-Access Network," Vehicular Technology Magazine, IEEE, vol. 8, no. 3, pp. 47-53, 2013.
-
(2013)
Vehicular Technology Magazine
, vol.8
, Issue.3
, pp. 47-53
-
-
Demestichas, P.1
Georgakopoulos, A.2
Karvounas, D.3
Tsagkaris, K.4
Stavroulaki, V.5
Lu, J.6
Xiong, C.7
Yao, J.8
-
2
-
-
84880243270
-
5G technology of mobile communication: A survey
-
A. Gohil, H. Modi, and S. Patel, "5G technology of mobile communication: A survey," in Intelligent Systems and Signal Processing (ISSP), 2013 International Conference on, 2013, pp. 288-292.
-
(2013)
Intelligent Systems and Signal Processing (ISSP), 2013 International Conference on
, pp. 288-292
-
-
Gohil, A.1
Modi, H.2
Patel, S.3
-
3
-
-
79551616430
-
Cognitive network inference through Bayesian network analysis
-
Dec
-
G. Quer, H. Meenakshisundaram, B. Tamma, B. S. Manoj, R. Rao, and M. Zorzi, "Cognitive Network Inference through Bayesian Network Analysis," in Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE, Dec 2010, pp. 1-6.
-
(2010)
Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE
, pp. 1-6
-
-
Quer, G.1
Meenakshisundaram, H.2
Tamma, B.3
Manoj, B.S.4
Rao, R.5
Zorzi, M.6
-
5
-
-
84893330744
-
Interference-aware routing for hop-count minimization in wireless D2D networks
-
P. Ren, Q. Du, and L. Sun, "Interference-aware routing for hop-count minimization in wireless D2D networks," in Communications in China-Workshops (CIC/ICCC), 2013 IEEE/CIC International Conference on, 2013, pp. 65-70.
-
(2013)
Communications in China-Workshops (CIC/ICCC), 2013 IEEE/CIC International Conference on
, pp. 65-70
-
-
Ren, P.1
Du, Q.2
Sun, L.3
-
7
-
-
79951510814
-
A lightweight group-key management protocol for secure ad-hoc-network routing
-
N. C. Fernandes and O. C. M. B. Duarte, "A lightweight group-key management protocol for secure ad-hoc-network routing," Computer Networks, vol. 55, no. 3, pp. 759-778, 2011.
-
(2011)
Computer Networks
, vol.55
, Issue.3
, pp. 759-778
-
-
Fernandes, N.C.1
Duarte, O.C.M.B.2
-
8
-
-
33744502133
-
Secure OLSR
-
1
-
F. Hong, L. Hong, and C. Fu, "Secure OLSR," in Advanced Information Networking and Applications, 2005. AINA 2005. 19th International Conference on, vol. 1, 2005, pp. 713-718 vol. 1.
-
(2005)
Advanced Information Networking and Applications, 2005. AINA 2005. 19th International Conference on
, vol.1
, pp. 713-718
-
-
Hong, F.1
Hong, L.2
Fu, C.3
-
9
-
-
78651347601
-
Routing, security, resource management, and monitoring in ad hoc networks: Implementation and integration
-
G. C. Hadjichristofi, L. A. DaSilva, S. F. Midkiff, U. Lee, and W. D. Sousa, "Routing, security, resource management, and monitoring in ad hoc networks: Implementation and integration," Computer Networks, vol. 55, no. 1, pp. 282-299, 2011.
-
(2011)
Computer Networks
, vol.55
, Issue.1
, pp. 282-299
-
-
Hadjichristofi, G.C.1
Dasilva, L.A.2
Midkiff, S.F.3
Lee, U.4
Sousa, W.D.5
-
10
-
-
33847356523
-
Optimization techniques for military multicast key management
-
IEEE
-
T. Aurisch, "Optimization techniques for military multicast key management," in Military Communications Conference, 2005. MILCOM 2005. IEEE, 2005, pp. 2570-2576 Vol. 4.
-
(2005)
Military Communications Conference, 2005. MILCOM 2005
, vol.4
, pp. 2570-2576
-
-
Aurisch, T.1
-
11
-
-
77951489959
-
A hierarchical identity based key management scheme in tactical mobile AD HOC networks
-
IEEE
-
F. Wang, H. Tang, F. Yu, and P. Mason, "A hierarchical identity based key management scheme in tactical Mobile Ad Hoc Networks," in Military Communications Conference, 2009. MILCOM 2009. IEEE, 2009, pp. 1-7.
-
(2009)
Military Communications Conference, 2009. MILCOM 2009
, pp. 1-7
-
-
Wang, F.1
Tang, H.2
Yu, F.3
Mason, P.4
-
14
-
-
84877577710
-
A survey of group key distribution schemes with self-healing property
-
IEEE
-
T. Rams and P. Pacyna, "A Survey of Group Key Distribution Schemes With Self-Healing Property," Communications Surveys Tutorials, IEEE, vol. 15, no. 2, pp. 820-842, 2013.
-
(2013)
Communications Surveys Tutorials
, vol.15
, Issue.2
, pp. 820-842
-
-
Rams, T.1
Pacyna, P.2
-
15
-
-
66249144693
-
Efficient region-based group key agreement protocol for AD HOC networks using elliptic curve cryptography
-
K. Kumar, V. Sumathy, and J. Nafeesa Begum, "Efficient Region-Based Group Key Agreement Protocol for Ad Hoc Networks using Elliptic Curve Cryptography," in Advance Computing Conference, 2009. IACC 2009. IEEE International, 2009, pp. 1052-1060.
-
(2009)
Advance Computing Conference, 2009. IACC 2009. IEEE International
, pp. 1052-1060
-
-
Kumar, K.1
Sumathy, V.2
Nafeesa Begum, J.3
|