-
1
-
-
85033670560
-
Specification of the Bluetooth system, Bluetooth Core Specification
-
Bluetooth, S.I.G, Specification of the Bluetooth system, Bluetooth Core Specification, Version 4.2, 2014
-
(2014)
Version
, vol.4
, pp. 2
-
-
Bluetooth, S.I.G.1
-
2
-
-
84901437451
-
A survey on Device-to-Device communication in cellular networks
-
Asadi A, Wang Q, Mancuso V (2014) A survey on Device-to-Device communication in cellular networks. IEEE Commun Surv Tutorials 16(4):1801–1819
-
(2014)
IEEE Commun Surv Tutorials
, vol.16
, Issue.4
, pp. 1801-1819
-
-
Asadi, A.1
Wang, Q.2
Mancuso, V.3
-
5
-
-
0032167293
-
UMTS/IMT-2000 based on wideband CDMA
-
Dahlman E, Gudmundson B, Nilsson M, Skold A (1998) UMTS/IMT-2000 based on wideband CDMA. IEEE Commun Mag 36(9):70–80
-
(1998)
IEEE Commun Mag
, vol.36
, Issue.9
, pp. 70-80
-
-
Dahlman, E.1
Gudmundson, B.2
Nilsson, M.3
Skold, A.4
-
7
-
-
72949120015
-
Device-to-Device communication as an underlay to LTE-advanced networks
-
Doppler K, Rinne M, Wijting C, Ribeiro C, Hugl K (2009) Device-to-Device communication as an underlay to LTE-advanced networks. IEEE Commun Mag 47(12):42–49
-
(2009)
IEEE Commun Mag
, vol.47
, Issue.12
, pp. 42-49
-
-
Doppler, K.1
Rinne, M.2
Wijting, C.3
Ribeiro, C.4
Hugl, K.5
-
8
-
-
84863772559
-
Operator controlled Device-to-Device communications in LTE-advanced networks
-
Lei L, Zhong Z, Lin C, Shen X (2012) Operator controlled Device-to-Device communications in LTE-advanced networks. IEEE Wirel Commun 19(3):96–104
-
(2012)
IEEE Wirel Commun
, vol.19
, Issue.3
, pp. 96-104
-
-
Lei, L.1
Zhong, Z.2
Lin, C.3
Shen, X.4
-
9
-
-
77955032700
-
Mode selection for Device-To-Device communication underlaying an LTE-Advanced network
-
Doppler K, Yu C, Ribeiro C, Janis P (2010) “Mode selection for Device-To-Device communication underlaying an LTE-Advanced network,” 2010 I.E. wireless communications and networking conference (WCNC), pp 1–6
-
(2010)
I.E. wireless communications and networking conference (WCNC), pp 1–6
-
-
Doppler, K.1
Yu, C.2
Ribeiro, C.3
Janis, P.4
-
10
-
-
84920845630
-
Device-to-device communication underlaying converged heterogeneous networks
-
Gamage A, Liang H, Zhang R, Shen X (2014) Device-to-device communication underlaying converged heterogeneous networks. IEEE Wirel Commun 21(6):98–107
-
(2014)
IEEE Wirel Commun
, vol.21
, Issue.6
, pp. 98-107
-
-
Gamage, A.1
Liang, H.2
Zhang, R.3
Shen, X.4
-
11
-
-
70349670758
-
Device-to-Device communication underlaying cellular communications systems
-
Janis P, Yu C, Doppler K, Ribeiro C, Wijting C, Hugl K, Tirkkonen O, Koivunen V (2009) Device-to-Device communication underlaying cellular communications systems. Int J Commun Netw Syst Sci 2(3):169–178
-
(2009)
Int J Commun Netw Syst Sci
, vol.2
, Issue.3
, pp. 169-178
-
-
Janis, P.1
Yu, C.2
Doppler, K.3
Ribeiro, C.4
Wijting, C.5
Hugl, K.6
Tirkkonen, O.7
Koivunen, V.8
-
12
-
-
78650904582
-
Toward proximity-aware internetworking
-
Corson M, Laroia R, Li J, Park V, Richardson T, Tsirtsis G (2010) Toward proximity-aware internetworking. IEEE Wirel Commun 17(6):26–33
-
(2010)
IEEE Wirel Commun
, vol.17
, Issue.6
, pp. 26-33
-
-
Corson, M.1
Laroia, R.2
Li, J.3
Park, V.4
Richardson, T.5
Tsirtsis, G.6
-
13
-
-
84882726164
-
Flashlinq: a synchronous distributed scheduler for peer-to-peer ad hoc networks
-
Wu X, Tavildar S, Shakkottai S, Richardson T, Li J, Laroia R, Jovicic A (2013) Flashlinq: a synchronous distributed scheduler for peer-to-peer ad hoc networks. IEEE/ACM Trans Networking 21(4):1215–1228
-
(2013)
IEEE/ACM Trans Networking
, vol.21
, Issue.4
, pp. 1215-1228
-
-
Wu, X.1
Tavildar, S.2
Shakkottai, S.3
Richardson, T.4
Li, J.5
Laroia, R.6
Jovicic, A.7
-
18
-
-
84923318649
-
Device-to-Device communications for national security and public safety
-
Fodor G, Parkvall S, Sorrentino S, Wallentin P, Lu Q, Brahmi N (2014) Device-to-Device communications for national security and public safety. IEEE Access 2:1510–1520
-
(2014)
IEEE Access
, vol.2
, pp. 1510-1520
-
-
Fodor, G.1
Parkvall, S.2
Sorrentino, S.3
Wallentin, P.4
Lu, Q.5
Brahmi, N.6
-
21
-
-
84930507156
-
M2M communications in 3GPP LTE/LTE-A networks: architectures, service requirements, challenges, and applications
-
Second Quarter
-
Ghavimi F, Chen H (2015) M2M communications in 3GPP LTE/LTE-A networks: architectures, service requirements, challenges, and applications. IEEE Commun Surv Tutorials 17(2):525–549 Second Quarter
-
(2015)
IEEE Commun Surv Tutorials
, vol.17
, Issue.2
, pp. 525-549
-
-
Ghavimi, F.1
Chen, H.2
-
25
-
-
84966827176
-
SeDS: Secure data sharing strategy for D2D communication in LTE-Advanced networks
-
Zhang A, Chen J, Hu R, Qian Y (2015) SeDS: Secure data sharing strategy for D2D communication in LTE-Advanced networks. IEEE Trans Veh Technol PP(99):1
-
(2015)
IEEE Trans Veh Technol
, vol.PP
, Issue.99
, pp. 1
-
-
Zhang, A.1
Chen, J.2
Hu, R.3
Qian, Y.4
-
26
-
-
84949923109
-
Secure key establishment for Device-to-Device communications
-
Shen W, Hong W, Cao X, Yin B, Shila D, Cheng Y (2014) “Secure key establishment for Device-to-Device communications,” 2014 I.E. Global Communications Conference (GLOBECOM), pp. 336–340
-
(2014)
I.E. Global Communications Conference (GLOBECOM), pp. 336–340
-
-
Shen, W.1
Hong, W.2
Cao, X.3
Yin, B.4
Shila, D.5
Cheng, Y.6
-
27
-
-
84911965411
-
Connectivity and security in a D2D communication protocol for public safety applications
-
Goratti L, Steri G, Gomez K, Baldini G (2014) “Connectivity and security in a D2D communication protocol for public safety applications,” 2014 International Symposium on Wireless Communications Systems (ISWCS), pp. 548–552
-
(2014)
International Symposium on Wireless Communications Systems (ISWCS), pp. 548–552
-
-
Goratti, L.1
Steri, G.2
Gomez, K.3
Baldini, G.4
-
28
-
-
84919384470
-
Secure Device-to-Device Authentication in Mobile Multi-hop Networks
-
Kwon H, Hahn C, Kim D, Kang K, Hur J (2014) “Secure Device-to-Device Authentication in Mobile Multi-hop Networks,” the 9th International Conference on Wireless Algorithms, Systems, and Applications, pp. 267–278
-
(2014)
The 9th International Conference on Wireless Algorithms, Systems, and Applications, pp. 267–278
-
-
Kwon, H.1
Hahn, C.2
Kim, D.3
Kang, K.4
Hur, J.5
-
31
-
-
84900387940
-
Secure device-to-device communication in LTE-A
-
Alam M, Yang D, Rodriguez J, Abd-Alhameed R (2014) Secure device-to-device communication in LTE-A. IEEE Commun Mag 52(4):66–73
-
(2014)
IEEE Commun Mag
, vol.52
, Issue.4
, pp. 66-73
-
-
Alam, M.1
Yang, D.2
Rodriguez, J.3
Abd-Alhameed, R.4
-
34
-
-
84910008119
-
Secure message delivery games for Device-to-Device communications
-
Panaousis E, Alpcan T, Fereidooni H, Conti M (2014) Secure message delivery games for Device-to-Device communications. Decision and Game Theory for Security, Lect Notes Comput Sci 8840:195–215
-
(2014)
Decision and Game Theory for Security, Lect Notes Comput Sci
, vol.8840
, pp. 195-215
-
-
Panaousis, E.1
Alpcan, T.2
Fereidooni, H.3
Conti, M.4
-
36
-
-
84966544124
-
Modeling and analysis on access control for Device-to-Device communications in cellular network: a network calculus based approach
-
Huang J, Sun Y, Xiong Z, Duan Q, Zhao Y, Cao X, Wang W (2015) Modeling and analysis on access control for Device-to-Device communications in cellular network: a network calculus based approach. IEEE Trans Veh Technol PP(99):1
-
(2015)
IEEE Trans Veh Technol
, vol.PP
, Issue.99
, pp. 1
-
-
Huang, J.1
Sun, Y.2
Xiong, Z.3
Duan, Q.4
Zhao, Y.5
Cao, X.6
Wang, W.7
-
37
-
-
84919326951
-
A priority-based access control model for Device-to-Device communications underlaying cellular network using network calculus
-
Huang J, Xiong Z, Li J, Chen Q, Duan Q, Zhao Y (2014) A priority-based access control model for Device-to-Device communications underlaying cellular network using network calculus. Wirel Algoritm Syst Appl 8491:613–623
-
(2014)
Wirel Algoritm Syst Appl
, vol.8491
, pp. 613-623
-
-
Huang, J.1
Xiong, Z.2
Li, J.3
Chen, Q.4
Duan, Q.5
Zhao, Y.6
-
38
-
-
84890430700
-
Secrecy-based access control for Device-to-Device communication underlaying cellular networks
-
Yue J, Ma C, Yu H, Zhou W (2013) Secrecy-based access control for Device-to-Device communication underlaying cellular networks. IEEE Commun Lett 17(11):2068–2071
-
(2013)
IEEE Commun Lett
, vol.17
, Issue.11
, pp. 2068-2071
-
-
Yue, J.1
Ma, C.2
Yu, H.3
Zhou, W.4
-
39
-
-
84907003865
-
Radio resource allocation for physical-layer security in D2D underlay communications
-
Zhang H, Wang T, Song L, Han Z (2014) “Radio resource allocation for physical-layer security in D2D underlay communications,” 2014 I.E. International Conference on Communications (ICC 2014), pp. 2319–2324
-
(2014)
E. International Conference on Communications (ICC
, pp. 2319-2324
-
-
Zhang, H.1
Wang, T.2
Song, L.3
-
40
-
-
84905227083
-
Device-to-device communications: The physical layer security advantage
-
Zhu D, Swindlehurst A, Fakoorian S, Xu W, Zhao C (2014) “Device-to-device communications: The physical layer security advantage,” 2014 I.E. International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.1606–1610
-
(2014)
I.E. International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.1606–1610
-
-
Zhu, D.1
Swindlehurst, A.2
Fakoorian, S.3
Xu, W.4
Zhao, C.5
-
41
-
-
84907897603
-
KEEP: Fast secret key extraction protocol for D2D communication
-
Xi W, Li X, Qian C, Han J, Tang S, Zhao J, Zhao K (2014) “KEEP: Fast secret key extraction protocol for D2D communication,” 2014 I.E. 22nd International Symposium of Quality of Service (IWQoS), pp. 350–359
-
(2014)
I.E. 22nd International Symposium of Quality of Service (IWQoS), pp. 350–359
-
-
Xi, W.1
Li, X.2
Qian, C.3
Han, J.4
Tang, S.5
Zhao, J.6
Zhao, K.7
-
42
-
-
84904412386
-
SYNERGY: A game-theoretical approach for cooperative key generation in wireless networks
-
Sun J, Chen X, Zhang J, Zhang Y, Zhang J (2014) “SYNERGY: A game-theoretical approach for cooperative key generation in wireless networks,” 2014 I.E. Conference on Computer Communications (INFOCOM), pp 997–1005
-
(2014)
I.E. Conference on Computer Communications (INFOCOM), pp 997–1005
-
-
Sun, J.1
Chen, X.2
Zhang, J.3
Zhang, Y.4
Zhang, J.5
-
43
-
-
84921325413
-
Social network aware Device-to-Device communication in wireless networks
-
Zhang Y, Pan E, Song L, Saad W, Dawy Z, Han Z (2015) Social network aware Device-to-Device communication in wireless networks. IEEE Trans Wirel Commun 14(1):177–190
-
(2015)
IEEE Trans Wirel Commun
, vol.14
, Issue.1
, pp. 177-190
-
-
Zhang, Y.1
Pan, E.2
Song, L.3
Saad, W.4
Dawy, Z.5
Han, Z.6
-
44
-
-
84948434446
-
Exploiting social ties for cooperative D2D communications: a mobile social networking case
-
Chen X, Proulx B, Gong X, Zhang J (2015) Exploiting social ties for cooperative D2D communications: a mobile social networking case. IEEE/ACM Trans Networking 23(5):1471–1484
-
(2015)
IEEE/ACM Trans Networking
, vol.23
, Issue.5
, pp. 1471-1484
-
-
Chen, X.1
Proulx, B.2
Gong, X.3
Zhang, J.4
-
45
-
-
85016817081
-
A study of stealthy denial-of-service attacks in Wi-Fi direct device-to-device networks
-
Hadiks A, Chen Y, Li F, Liu B (2014) “A study of stealthy denial-of-service attacks in Wi-Fi direct device-to-device networks,” 2014 I.E. 11th consumer communications and networking conference (CCNC 2014), pp507–508
-
(2014)
I.E. 11th consumer communications and networking conference (CCNC 2014), pp507–508
-
-
Hadiks, A.1
Chen, Y.2
Li, F.3
Liu, B.4
-
46
-
-
84946561244
-
An unwanted content Control system in pervasive social networking based on trust management
-
Ma S, Yan Z (2015) An unwanted content Control system in pervasive social networking based on trust management. ACM Trans Multimed Comput Commun Appl 12(1s)
-
(2015)
ACM Trans Multimed Comput Commun Appl
, vol.12
, Issue.1s
-
-
Ma, S.1
Yan, Z.2
-
48
-
-
84875695373
-
A key management and secure routing integrated framework for mobile ad-hoc networks
-
Zhao S, Robert K, Akshai A (2013) A key management and secure routing integrated framework for mobile ad-hoc networks. Ad Hoc Netw 11(3):1046–1061
-
(2013)
Ad Hoc Netw
, vol.11
, Issue.3
, pp. 1046-1061
-
-
Zhao, S.1
Robert, K.2
Akshai, A.3
-
49
-
-
84918571465
-
Parallel key management scheme for mobile ad hoc network based on traffic mining
-
Lakshmi P, Kumar A (2015) Parallel key management scheme for mobile ad hoc network based on traffic mining. IET Inf Secur 9(1):14–23
-
(2015)
IET Inf Secur
, vol.9
, Issue.1
, pp. 14-23
-
-
Lakshmi, P.1
Kumar, A.2
-
50
-
-
33144467802
-
Secure data communication in mobile ad hoc networks
-
Papadimitratos P, Haas Z (2006) Secure data communication in mobile ad hoc networks. IEEE J Sel Areas Commun 24(2):343–356
-
(2006)
IEEE J Sel Areas Commun
, vol.24
, Issue.2
, pp. 343-356
-
-
Papadimitratos, P.1
Haas, Z.2
-
51
-
-
15244360279
-
An efficient key predistribution scheme for ad hoc network security
-
Ramkumar M, Memon N (2005) An efficient key predistribution scheme for ad hoc network security. IEEE J Sel Areas Commun 23(3):611–621
-
(2005)
IEEE J Sel Areas Commun
, vol.23
, Issue.3
, pp. 611-621
-
-
Ramkumar, M.1
Memon, N.2
-
52
-
-
0036804761
-
Routing security in wireless ad hoc networks
-
Deng H, Li W, Agrawal D (2002) Routing security in wireless ad hoc networks. IEEE Commun Mag 40(10):70–75
-
(2002)
IEEE Commun Mag
, vol.40
, Issue.10
, pp. 70-75
-
-
Deng, H.1
Li, W.2
Agrawal, D.3
-
53
-
-
36849079903
-
A survey of security issues in mobile ad hoc networks
-
Fourth Quarter
-
Djamel D, Khelladi L, Badache N (2007) A survey of security issues in mobile ad hoc networks. IEEE Wirel Commun 14(5):85–91 Fourth Quarter
-
(2007)
IEEE Wirel Commun
, vol.14
, Issue.5
, pp. 85-91
-
-
Djamel, D.1
Khelladi, L.2
Badache, N.3
-
54
-
-
70450164574
-
A survey of secure mobile ad hoc routing protocols
-
Fourth Quarter
-
Loay A, Khokhar A, Guizani M (2008) A survey of secure mobile ad hoc routing protocols. IEEE Commun Surv Tutorials 10(4):78–93 Fourth Quarter
-
(2008)
IEEE Commun Surv Tutorials
, vol.10
, Issue.4
, pp. 78-93
-
-
Loay, A.1
Khokhar, A.2
Guizani, M.3
-
55
-
-
56449121040
-
Improving on-demand data access efficiency in MANETs with cooperative caching
-
Yu D, Gupta S, Varsamopoulos G (2009) Improving on-demand data access efficiency in MANETs with cooperative caching. Ad Hoc Netw 7(3):579–598
-
(2009)
Ad Hoc Netw
, vol.7
, Issue.3
, pp. 579-598
-
-
Yu, D.1
Gupta, S.2
Varsamopoulos, G.3
-
61
-
-
85032751776
-
Enhancing physical-layer secrecy in multi-antenna wireless systems: an overview of signal processing approaches
-
Hong Y, Lan P, Kuo C (2013) Enhancing physical-layer secrecy in multi-antenna wireless systems: an overview of signal processing approaches. IEEE Signal Process Mag 30(5):29–40
-
(2013)
IEEE Signal Process Mag
, vol.30
, Issue.5
, pp. 29-40
-
-
Hong, Y.1
Lan, P.2
Kuo, C.3
-
62
-
-
84865493080
-
Cooperative key generation in wireless networks
-
Lai L, Liang Y, Du W (2012) Cooperative key generation in wireless networks. IEEE J Sel Areas Commun 30(8):1578–1588
-
(2012)
IEEE J Sel Areas Commun
, vol.30
, Issue.8
, pp. 1578-1588
-
-
Lai, L.1
Liang, Y.2
Du, W.3
-
63
-
-
85027051275
-
Protect pervasive social networking based on two-dimensional trust levels
-
Yan Z, Wang M (2014) Protect pervasive social networking based on two-dimensional trust levels. IEEE Syst J PP(99):1–12
-
(2014)
IEEE Syst J
, vol.PP
, Issue.99
, pp. 1-12
-
-
Yan, Z.1
Wang, M.2
|