-
1
-
-
84863553166
-
Enforcing dynamic spectrum access with spectrum permits
-
Hilton Head Island, SC, June
-
L. Yang, Z. Zhang, B. Zhao, C. Kruegel, and H. Zheng, "Enforcing dynamic spectrum access with spectrum permits," in ACM MobiHoc'12, Hilton Head Island, SC, June 2012, pp. 195-204.
-
(2012)
ACM MobiHoc'12
, pp. 195-204
-
-
Yang, L.1
Zhang, Z.2
Zhao, B.3
Kruegel, C.4
Zheng, H.5
-
2
-
-
84954171598
-
Towards an architecture for efficient spectrum slicing
-
Tucson, AZ, Feb.
-
V. Brik, V. Shrivastava, A. Mishra, and S. Banerjee, "Towards an architecture for efficient spectrum slicing," in HotMobile'07, Tucson, AZ, Feb. 2007, pp. 61-69.
-
(2007)
HotMobile'07
, pp. 61-69
-
-
Brik, V.1
Shrivastava, V.2
Mishra, A.3
Banerjee, S.4
-
3
-
-
48349130414
-
TRIESTE: A trusted radio infrastructure for enforcing spectrum etiquettes
-
Reston, VA, Sept.
-
W. Xu, P. Kamat, and W. Trappe, "TRIESTE: A trusted radio infrastructure for enforcing spectrum etiquettes," in IEEE Workshop on SDR Networks, Reston, VA, Sept. 2006, pp. 101-109.
-
(2006)
IEEE Workshop on SDR Networks
, pp. 101-109
-
-
Xu, W.1
Kamat, P.2
Trappe, W.3
-
4
-
-
34548760953
-
A policy engine for spectrum sharing
-
Dublin, Ireland, Apr.
-
G. Denker, E. Elenius, R. Senanayake, M. Stehr, and D. Wilkins, "A policy engine for spectrum sharing," in IEEE DySPAN'07, Dublin, Ireland, Apr. 2007, pp. 55-65.
-
(2007)
IEEE DySPAN'07
, pp. 55-65
-
-
Denker, G.1
Elenius, E.2
Senanayake, R.3
Stehr, M.4
Wilkins, D.5
-
5
-
-
70349696172
-
ALDO: An anomaly detection framework for dynamic spectrum access networks
-
Brazil, Apr.
-
S. Liu, L. Greenstein, Y. Chen, and W. Trappe, "ALDO: An anomaly detection framework for dynamic spectrum access networks," in IEEE INFOCOM'09, Rio de Janeiro, Brazil, Apr. 2009, pp. 675-683.
-
(2009)
IEEE INFOCOM'09, Rio de Janeiro
, pp. 675-683
-
-
Liu, S.1
Greenstein, L.2
Chen, Y.3
Trappe, W.4
-
6
-
-
79951577034
-
Cooperative spectrum sensing in cognitive radio networks: A survey
-
Mar.
-
I. Akyildiz, B. Lo, and R. Balakrishnan, "Cooperative spectrum sensing in cognitive radio networks: A survey," Physical Communication, vol. 4, no. 1, pp. 40-62, Mar. 2011.
-
(2011)
Physical Communication
, vol.4
, Issue.1
, pp. 40-62
-
-
Akyildiz, I.1
Lo, B.2
Balakrishnan, R.3
-
7
-
-
51349154337
-
Robust distributed spectrum sensing in cognitive radio networks
-
Apr.
-
R. Chen, J. Park, and K. Bian, "Robust distributed spectrum sensing in cognitive radio networks," in INFOCOM'08, Apr. 2008, pp. 1876-1884.
-
(2008)
INFOCOM'08
, pp. 1876-1884
-
-
Chen, R.1
Park, J.2
Bian, K.3
-
8
-
-
84861582938
-
Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks
-
Orlando, FL, Mar.
-
Q. Yan, M. Li, T. Jiang, W. Lou, and Y. Hou, "Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks," in INFOCOM'12, Orlando, FL, Mar. 2012.
-
(2012)
INFOCOM'12
-
-
Yan, Q.1
Li, M.2
Jiang, T.3
Lou, W.4
Hou, Y.5
-
9
-
-
84883085274
-
Secure crowdsourcing-based cooperative spectrum sensing
-
Turin, Italy, Apr.
-
R. Zhang, et al., "Secure crowdsourcing-based cooperative spectrum sensing," in INFOCOM'13, Turin, Italy, Apr. 2013, pp. 2526-2534.
-
(2013)
INFOCOM'13
, pp. 2526-2534
-
-
Zhang, R.1
-
10
-
-
38149046958
-
Defense against primary user emulation attacks in cognitive radio networks
-
Jan.
-
R. Chen, J. Park, and J. Reed, "Defense against primary user emulation attacks in cognitive radio networks," IEEE JSAC, vol.26, no.1, pp. 25-37, Jan. 2008.
-
(2008)
IEEE JSAC
, vol.26
, Issue.1
, pp. 25-37
-
-
Chen, R.1
Park, J.2
Reed, J.3
-
11
-
-
77955196382
-
Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures
-
Oakland, CA, May
-
Y. Liu, P. Ning, and H. Dai, "Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures," in S&P'10, Oakland, CA, May 2010, pp. 286-301.
-
(2010)
S&P'10
, pp. 286-301
-
-
Liu, Y.1
Ning, P.2
Dai, H.3
-
12
-
-
80051914579
-
Cryptographic link signatures for spectrum usage authentication in cognitive radio
-
Hamburg, Germany, June
-
X. Tan, K. Borle, W. Du, and B. Chen, "Cryptographic link signatures for spectrum usage authentication in cognitive radio," in WiSec'11, Hamburg, Germany, June 2011, pp. 79-90.
-
(2011)
WiSec'11
, pp. 79-90
-
-
Tan, X.1
Borle, K.2
Du, W.3
Chen, B.4
-
13
-
-
84890537838
-
A physical layer authentication scheme for countering primary user emulation attack
-
Vancouver, Canada, May
-
K. Borle, B. Chen, and W. Du, "A physical layer authentication scheme for countering primary user emulation attack," in ICASSP'13, Vancouver, Canada, May 2013, pp. 2935-2939.
-
(2013)
ICASSP'13
, pp. 2935-2939
-
-
Borle, K.1
Chen, B.2
Du, W.3
-
14
-
-
84874426137
-
Secret agent radio: Covert communication through dirty constellations
-
Berkeley, CA, May
-
A. Dutta, D. Saha, D. Grunwald, and D. Sicker, "Secret agent radio: Covert communication through dirty constellations," in IH'12, Berkeley, CA, May 2012, pp. 160-175.
-
(2012)
IH'12
, pp. 160-175
-
-
Dutta, A.1
Saha, D.2
Grunwald, D.3
Sicker, D.4
-
15
-
-
84893562953
-
PHY-layer authentication by introducing controlled inter symbol interference
-
Washington, D. C. , Oct.
-
V. Kumar, J. M. Park, T. C. Clancy, and B. Kaigui, "PHY-layer authentication by introducing controlled inter symbol interference," in CNS'13, Washington, D.C., Oct. 2013, pp. 10-18.
-
(2013)
CNS'13
, pp. 10-18
-
-
Kumar, V.1
Park, J.M.2
Clancy, T.C.3
Kaigui, B.4
-
17
-
-
77953213173
-
Secure collaborative sensing for crowd sourcing spectrum data in white space networks
-
Singapore, Apr.
-
O. Fatemieh, R. Chandra, and C. Gunter, "Secure collaborative sensing for crowd sourcing spectrum data in white space networks," in DySPAN' 10, Singapore, Apr. 2010, pp. 1-12.
-
(2010)
DySPAN' 10
, pp. 12
-
-
Fatemieh, O.1
Chandra, R.2
Gunter, C.3
-
18
-
-
79251602150
-
Detection of small-scale primary users in cognitive radio networks
-
Feb.
-
A. Min, X. Zhang, and K. Shin, "Detection of small-scale primary users in cognitive radio networks," IEEE JSAC, vol. 29, no. 2, pp. 349-361, Feb. 2011.
-
(2011)
IEEE JSAC
, vol.29
, Issue.2
, pp. 349-361
-
-
Min, A.1
Zhang, X.2
Shin, K.3
-
19
-
-
84954275871
-
-
"SHA-1," http://en.wikipedia.org/wiki/SHA-1, [Online].
-
-
-
-
20
-
-
77953882941
-
The transport layer security (TLS) protocol
-
Apr.
-
T. Dierks and E. Rescorla, "The transport layer security (TLS) protocol," RFC 4346, Apr. 2006.
-
(2006)
RFC 4346
-
-
Dierks, T.1
Rescorla, E.2
-
22
-
-
0035669989
-
A comparison of pilot-aided channel estimation methods for OFDM systems
-
Dec.
-
M. Morelli and U. Mengali, "A comparison of pilot-aided channel estimation methods for ofdm systems," Signal Processing, IEEE Transactions on, vol. 49, no. 12, pp. 3065-3073, Dec. 2001.
-
(2001)
Signal Processing, IEEE Transactions on
, vol.49
, Issue.12
, pp. 3065-3073
-
-
Morelli, M.1
Mengali, U.2
-
23
-
-
33646910483
-
Snr estimation in time-varying fading channels
-
May
-
A. Wiesel, J. Goldberg, and H. Messer-Yaron, "Snr estimation in time-varying fading channels," Communications, IEEE Transactions on, vol. 54, no. 5, pp. 841-848, May 2006.
-
(2006)
Communications, IEEE Transactions on
, vol.54
, Issue.5
, pp. 841-848
-
-
Wiesel, A.1
Goldberg, J.2
Messer-Yaron, H.3
|