Cognitive radio network security: A survey
Recent advancements in wireless communication are creating a spectrum shortage problem on a daily basis. Recently, Cognitive Radio (CR), a novel technology, has attempted to minimize this problem by dynamically using the free spectrum in wireless communications and mobile computing. Cognitive radio...
| Main Authors: | Hussain, Omar, Hussain, Farookh, Parvin, Sazia, Han, Song, Tian, Biming, Chang, Elizabeth |
|---|---|
| Format: | Journal Article |
| Published: |
Academic Press
2012
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/11339 |
Similar Items
Trust-Based Authentication for Secure Communication in Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
A combinational approach for trust establishment in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2011)
by: Parvin, Sazia, et al.
Published: (2011)
Trust Based Security for Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
Trust-based spectrum sharing for cognitive radio networks
by: Hussain, Omar, et al.
Published: (2012)
by: Hussain, Omar, et al.
Published: (2012)
Towards Trust Establishment for Spectrum Selection in Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
Digital signature-based secure communication in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2011)
by: Parvin, Sazia, et al.
Published: (2011)
Authenticated spectrum sharing for secondary users in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
Trust-based Throughput in Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2012)
by: Parvin, Sazia, et al.
Published: (2012)
Digital Signature-based authentication framework in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2012)
by: Parvin, Sazia, et al.
Published: (2012)
Comparative analysis of trust and security
by: Hussain, Farookh Khadeer, et al.
Published: (2006)
by: Hussain, Farookh Khadeer, et al.
Published: (2006)
A Framework for User Feedback Based Cloud Service Monitoring
by: Hussain, Omar, et al.
Published: (2012)
by: Hussain, Omar, et al.
Published: (2012)
Security performance analysis of photography service system / Farah Shazwani Ismail
by: Ismail, Farah Shazwani
Published: (2019)
by: Ismail, Farah Shazwani
Published: (2019)
Fuzzy nature and dynamic trust modeling in service oriented environments
by: Chang, Elizabeth, et al.
Published: (2005)
by: Chang, Elizabeth, et al.
Published: (2005)
User contribution measurement model for web-based discussion forums
by: Chai, Kevin, et al.
Published: (2009)
by: Chai, Kevin, et al.
Published: (2009)
An attack on undeniable partially blind signatures
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Taxonomy of attacks on wireless sensor networks
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Self-Healing Key Distribution Schemes for Wireless Networks: A Survey
by: Tian, Biming, et al.
Published: (2011)
by: Tian, Biming, et al.
Published: (2011)
Exploring personalised autonomous vehicles to influence user trust
by: Sun, Xu, et al.
Published: (2020)
by: Sun, Xu, et al.
Published: (2020)
Secure e-transactions using mobile agents with agent broker
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
A user adaptable user interface model to support ubiquitous user access to EIS style applications
by: Davis, Jon, et al.
Published: (2005)
by: Davis, Jon, et al.
Published: (2005)
A Secure Key Management Model for Wireless Mesh Networks
by: Gao, Li, et al.
Published: (2010)
by: Gao, Li, et al.
Published: (2010)
Understanding smartphone users' awareness of security and privacy in downloading third-party applications - A survey in UK and Japan
by: Kawakubo, Noriko
Published: (2013)
by: Kawakubo, Noriko
Published: (2013)
A usability-evaluation metric based on a soft-computing approach
by: Chang, Elizabeth, et al.
Published: (2006)
by: Chang, Elizabeth, et al.
Published: (2006)
Modeling the risk relationships and defining the risk set
by: Hussain, Omar, et al.
Published: (2005)
by: Hussain, Omar, et al.
Published: (2005)
Trust-based mechanisms for secure communication in cognitive radio networks
by: Parvin, Sazia
Published: (2013)
by: Parvin, Sazia
Published: (2013)
Involving older people in research: practical considerations when using the authenticity criteria in constructivist inquiry
by: Brown Wilson, Christine, et al.
Published: (2011)
by: Brown Wilson, Christine, et al.
Published: (2011)
Online Clothing Shopbots via Web Content Extraction / Nurul Syazwani Ramzi
by: Ramzi, Nurul Syazwani
Published: (2017)
by: Ramzi, Nurul Syazwani
Published: (2017)
Interactive 3D house marketing / Abu Bakar Mohamed
by: Mohamed, Abu Bakar
Published: (2004)
by: Mohamed, Abu Bakar
Published: (2004)
Design of a web-based LBS framework addressing usability, cost, and implementation constraints
by: Delfos, Jacob, et al.
Published: (2010)
by: Delfos, Jacob, et al.
Published: (2010)
Mobile road safety learning apps for children using digital comic and multimedia approach / Muhammad Fazli Mihsah Mohd Fazilah
by: Mohd Fazilah, Muhammad Fazli
Published: (2020)
by: Mohd Fazilah, Muhammad Fazli
Published: (2020)
Merekod markah menggunakan kod QR ke dalam sistem pendaftaran kokurikulum (marks recorded in co-curricular registration system using QR code) / Teh Faradilla Abdul Rahman dan Zamri Abu Bakar
by: Abdul Rahman, Teh Faradilla, et al.
Published: (2019)
by: Abdul Rahman, Teh Faradilla, et al.
Published: (2019)
IM-Vative sandbox: fun learning in mastering
hypertext markup language (HTML) / Izzatil Husna Arshad ...[et al.]
by: Arshad, Izzatil Husna, et al.
Published: (2020)
by: Arshad, Izzatil Husna, et al.
Published: (2020)
UCOSAIS: A framework for user-centered online service advertising information search
by: Dong, Hai, et al.
Published: (2013)
by: Dong, Hai, et al.
Published: (2013)
Malaysian Female Pre-Service Teachers Online: Exploring Their Internet Use And Attitudes
by: Wong, Su Luan, et al.
Published: (2005)
by: Wong, Su Luan, et al.
Published: (2005)
A methodology for risk based decision making in a service oriented environment
by: Hussain, Omar, et al.
Published: (2006)
by: Hussain, Omar, et al.
Published: (2006)
Incorporation Of Certification Revocation And Time Concept Into A Trust Model For Information Security System
by: Azimzadeh, Fatemeh
Published: (2007)
by: Azimzadeh, Fatemeh
Published: (2007)
Improving security requirements adequacy: an interval type 2 fuzzy logic security assessment system
by: Hibshi, Hanan, et al.
Published: (2016)
by: Hibshi, Hanan, et al.
Published: (2016)
Defining reputation in service oriented environment
by: Hussain, Farookh, et al.
Published: (2006)
by: Hussain, Farookh, et al.
Published: (2006)
Secure web services using two-way authentication and three-party key establishment for service delivery
by: Han, Song, et al.
Published: (2009)
by: Han, Song, et al.
Published: (2009)
State of the art Review for Trust Maintenance in Organizations
by: Fachrunnisa, Olivia, et al.
Published: (2010)
by: Fachrunnisa, Olivia, et al.
Published: (2010)
Similar Items
-
Trust-Based Authentication for Secure Communication in Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010) -
A combinational approach for trust establishment in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2011) -
Trust Based Security for Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010) -
Trust-based spectrum sharing for cognitive radio networks
by: Hussain, Omar, et al.
Published: (2012) -
Towards Trust Establishment for Spectrum Selection in Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010)