-
1
-
-
84858121087
-
Design aspects of network assisted device-to-device communications
-
G. Fodor, E. Dahlman, G. Mildh, S. Parkvall, N. Reider, G. Miklós, Z. Turányi, "Design aspects of network assisted device-to-device communications", IEEE Commun. Mag. 50 (3), pp. 170-177, 2012.
-
(2012)
IEEE Commun. Mag.
, vol.50
, Issue.3
, pp. 170-177
-
-
Fodor, G.1
Dahlman, E.2
Mildh, G.3
Parkvall, S.4
Reider, N.5
Miklós, G.6
Turányi, Z.7
-
2
-
-
84958542525
-
Hybrid model for LTE network-assisted D2D communications
-
Springer International Publishing
-
G. T, Thouraya, S. Tsang Kwong U and A. Hossam; "Hybrid Model for LTE Network-Assisted D2D Communications", ADHOC-NOW, Springer International Publishing, pp. 100-113, 2014.
-
(2014)
ADHOC-NOW
, pp. 100-113
-
-
Thouraya G, T.1
Tsang, S.2
Kwong, U.3
Hossam, A.4
-
3
-
-
84879309596
-
Solving the data overload: Device-to-device bearer control architecture for cellular data offloading
-
M. J. Yang, S. Y. Lim, H. J. Park, N. H. Park, Solving the data overload: Device-to-device bearer control architecture for cellular data offloading. IEEE Veh. Technol. Mag. 8 (1), pp. 31-39, 2013.
-
(2013)
IEEE Veh. Technol. Mag.
, vol.8
, Issue.1
, pp. 31-39
-
-
Yang, M.J.1
Lim, S.Y.2
Park, H.J.3
Park, N.H.4
-
4
-
-
84858407853
-
Performance analysis of a distributed resource allocation scheme for D2D communications
-
M. Belleschi, G. Fodor, A. Abrardo, "Performance analysis of a distributed resource allocation scheme for D2D communications", In IEEE GLOBECOM Workshops 2011, pp. 358-362, 2011.
-
(2011)
IEEE GLOBECOM Workshops
, pp. 358-362
-
-
Belleschi, M.1
Fodor, G.2
Abrardo, A.3
-
5
-
-
78650733522
-
Efficient resource allocation for device-to-device communication underlaying LTE network
-
Zulhasnine, M.; Changcheng Huang; Srinivasan, A., "Efficient resource allocation for device-to-device communication underlaying LTE network", WiMob, pp. 368-375, 2010.
-
(2010)
WiMob
, pp. 368-375
-
-
Zulhasnine, M.1
Huang, C.2
Srinivasan, A.3
-
8
-
-
84949500848
-
Security architecture
-
3GPP, TS 33. 401 v. 12. 9. 0, Sept
-
3GPP, TS 33. 401, v. 12. 9. 0 "Security Architecture", Rel. 12, Sept. 2013.
-
(2013)
Rel. 12
-
-
-
9
-
-
84900387940
-
Secure deviceto-device communication in LTE-A
-
Alam, M.; Du Yang; Rodriguez, J.; Abd-alhameed, R., "Secure deviceto-device communication in LTE-A, " Communications Magazine, IEEE, vol. 52, no. 4, pp. 66, 73, 2014.
-
(2014)
Communications Magazine, IEEE
, vol.52
, Issue.4
, pp. 66-73
-
-
Alam, M.1
Yang, D.2
Rodriguez, J.3
Abd-Alhameed, R.4
-
12
-
-
84949502253
-
Study on security issues to support proximity services (ProSe)
-
3GPP TR 33. 833 v1. 2. 0, Nov
-
3GPP TR 33. 833 v1. 2. 0: "Study on Security issues to support Proximity Services (ProSe)", Release 13, Nov. 2014.
-
(2014)
Release 13
-
-
-
16
-
-
33646048509
-
The personal pki
-
C. J. Mitchell, editor, IEE
-
C. J. Mitchell and R. Schaffelhofer. The personal pki. In C. J. Mitchell, editor, Security for Mobility, chapter 3, IEE, pages 35-61, 2004.
-
(2004)
Security for Mobility, Chapter 3
, pp. 35-61
-
-
Mitchell, C.J.1
Schaffelhofer, R.2
-
17
-
-
38049004199
-
Chosen ciphertext secure identity-based encryption in the standard model with short ciphertexts
-
E Kiltz. "Chosen ciphertext secure identity-based encryption in the standard model with short ciphertexts". Cryptology ePrint Archive, 2006.
-
(2006)
Cryptology EPrint Archive
-
-
Kiltz, E.1
-
18
-
-
24944566040
-
Efficient identity-based encryption without random oracles
-
Cramer, R. J. F. (ed.)
-
B Waters. Efficient identity-based encryption without random oracles. In: Cramer, R. J. F. (ed.) EUROCRYPT, 3494: 114-127, 2005.
-
(2005)
EUROCRYPT
, vol.3494
, pp. 114-127
-
-
Waters, B.1
-
21
-
-
84912096182
-
Secure group communication based on elliptic curve cryptography
-
M. Manisha and M. Rajesh. "Secure Group Communication based on Elliptic Curve Cryptography". Transactions on Networks and Communications, v. 2, n. 1, pp. 1-26, 2014.
-
(2014)
Transactions on Networks and Communications
, vol.2
, Issue.1
, pp. 1-26
-
-
Manisha, M.1
Rajesh, M.2
-
23
-
-
4544385042
-
An authenticated broadcasting scheme for wireless ad-hoc network
-
Miri, M. J.; "An authenticated broadcasting scheme for wireless ad-hoc network". in Proc. CNSR 2004. IEEE Computer Society, 69-74, 2004.
-
(2004)
Proc. CNSR 2004. IEEE Computer Society
, pp. 69-74
-
-
Miri, M.J.1
-
24
-
-
7744225358
-
Efficient identity-based security schemes for ad-hoc network routing protocols
-
Miri, M. J.;"Efficient identity-based security schemes for ad-hoc network routing protocols". Ad Hoc Networks, 309-317, 2005.
-
(2005)
Ad Hoc Networks
, pp. 309-317
-
-
Miri, M.J.1
-
25
-
-
58449126665
-
An identity-based broadcast encryption protocol for ad hoc networks
-
L. Zhang, Y. H., "An identity-based broadcast encryption protocol for ad hoc networks". Young Compiter Scientists, International Conference for, 1619-1623, 2008.
-
(2008)
Young Compiter Scientists, International Conference for
, pp. 1619-1623
-
-
Zhang, L.1
-
26
-
-
34548839108
-
Improved id-based security framework for ad-hoc network
-
Lin, Y. C., "Improved id-based security framework for ad-hoc network". Ad Hoc Networks, 47-60, 2008.
-
(2008)
Ad Hoc Networks
, pp. 47-60
-
-
Lin, Y.C.1
-
27
-
-
33646950088
-
Constant-round contributory group key agreement for ad-hoc networks
-
IEEE Computer Society Press
-
P. Zhang, C. Y., "Constant-round contributory group key agreement for ad-hoc networks". in Proc. IEEE Wireless Communications, Networking and mobile Computing. IEEE Computer Society Press, 2005.
-
(2005)
Proc. IEEE Wireless Communications, Networking and Mobile Computing
-
-
Zhang, P.1
|