-
1
-
-
72949120015
-
Deviceto-device communication as an underlay to LTE-advanced networks
-
K. Doppler, M. Rinne, C. Wijting, C. B. Ribeiro, and K. Hugl, "Deviceto-device communication as an underlay to LTE-advanced networks," IEEE Communications Magazine, vol. 47, no. 12, pp. 42-49, 2009
-
(2009)
IEEE Communications Magazine
, vol.47
, Issue.12
, pp. 42-49
-
-
Doppler, K.1
Rinne, M.2
Wijting, C.3
Ribeiro, C.B.4
Hugl, K.5
-
2
-
-
70449509750
-
Power optimization of device-to-device communication underlaying cellular communication
-
C. Yu, O. Tirkkonen, K. Doppler, and C. Ribeiro, "Power optimization of device-to-device communication underlaying cellular communication," in Proc. IEEE ICC, pp. 1-5, 2009
-
(2009)
Proc. IEEE ICC
, pp. 1-5
-
-
Yu, C.1
Tirkkonen, O.2
Doppler, K.3
Ribeiro, C.4
-
3
-
-
84860393847
-
Resource sharing optimization for device-to-device communication underlaying cellular networks
-
C. Yu, K. Doppler, C. B. Ribeiro, and O. Tirkkonen, "Resource sharing optimization for device-to-device communication underlaying cellular networks," IEEE Trans. Wireless Commun., vol. 10, no. 8, pp. 2752-2763, 2011
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.8
, pp. 2752-2763
-
-
Yu, C.1
Doppler, K.2
Ribeiro, C.B.3
Tirkkonen, O.4
-
5
-
-
84897805409
-
Device-to-device communications with WiFi Direct: Overview and experimentation
-
A. G. Saavedra and P. Serrano, "Device-to-device communications with WiFi Direct: Overview and experimentation," IEEE Wireless Communications, vol. 20, no. 3, 2013
-
(2013)
IEEE Wireless Communications
, vol.20
, Issue.3
-
-
Saavedra, A.G.1
Serrano, P.2
-
7
-
-
33751044073
-
Talking to strangers: Authentication in Ad-Hoc wireless networks
-
D. Balfanz, D. K. Smetters, P. Stewart, and H. C. Wong, "Talking to strangers: Authentication in Ad-Hoc wireless networks," in Proc. Network and Distributed System Security Symposium Conference, 2002
-
(2002)
Proc. Network and Distributed System Security Symposium Conference
-
-
Balfanz, D.1
Smetters, D.K.2
Stewart, P.3
Wong, H.C.4
-
8
-
-
23944521144
-
Manual authentication for wireless devices
-
C. Gehrmann, C. J. Mitchell, and K. Nyberg, "Manual authentication for wireless devices," RSA Cryptobytes, vol. 7, No. 1, pp. 29-37, 2004
-
(2004)
RSA Cryptobytes
, vol.7
, Issue.1
, pp. 29-37
-
-
Gehrmann, C.1
Mitchell, C.J.2
Nyberg, K.3
-
10
-
-
84891104842
-
Physical layer security of D2D communications underlaying cellular networks
-
J. Wang, Ch. Li, and J. Wu, "Physical layer security of D2D communications underlaying cellular networks," Applied Mechanics and Materials, vol. 441, pp. 951-954, 2014
-
(2014)
Applied Mechanics and Materials
, vol.441
, pp. 951-954
-
-
Wang, J.1
Li Ch.2
Wu, J.3
-
11
-
-
84905227083
-
Device-to-device communications: The physical layer security advantage
-
D. Zhu, A. L. Swindlehurst, S. A. Fakoorian, W. Xu, and Ch. Zhao, "Device-to-device communications: The physical layer security advantage. " in IEEE ICASSP, 2014
-
(2014)
IEEE ICASSP
-
-
Zhu, D.1
Swindlehurst, A.L.2
Fakoorian, S.A.3
Xu, W.4
Zhao Ch.5
-
13
-
-
85184636921
-
-
Wi-Fi Direct Demo
-
Wi-Fi Direct Demo, available on line: http://www. Androidside. com
-
-
-
-
14
-
-
84858121087
-
Design aspects of network assisted device-to-device communications
-
G. Fodor, E. Dahlman, G. Mildh, S. Parkvall, N. Reider, G. Miklos, and Z. Turanyi, "Design aspects of network assisted device-to-device communications," IEEE Communications Magazine, vol. 50, no. 3, pp. 170-177, 2012.
-
(2012)
IEEE Communications Magazine
, vol.50
, Issue.3
, pp. 170-177
-
-
Fodor, G.1
Dahlman, E.2
Mildh, G.3
Parkvall, S.4
Reider, N.5
Miklos, G.6
Turanyi, Z.7
|