Trust-Based Authentication for Secure Communication in Cognitive Radio Networks
Over the past few years, Cognitive Radio (CR) has been considered as a demanding concept for improving the utilization of limited radio spectrum resources for future wireless communications and mobile computing. Since a member of Cognitive Radio Networks may join or leave the network at any time, th...
| Main Authors: | Parvin, Sazia, Han, Song, Tian, Biming, Hussain, Farookh Khadeer |
|---|---|
| Other Authors: | Jiannong Cao |
| Format: | Conference Paper |
| Published: |
IEEE
2010
|
| Subjects: | |
| Online Access: | http://doi.ieeecomputersociety.org/10.1109/EUC.2010.95 http://hdl.handle.net/20.500.11937/16807 |
Similar Items
A combinational approach for trust establishment in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2011)
by: Parvin, Sazia, et al.
Published: (2011)
Trust Based Security for Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
Cognitive radio network security: A survey
by: Hussain, Omar, et al.
Published: (2012)
by: Hussain, Omar, et al.
Published: (2012)
Trust-based spectrum sharing for cognitive radio networks
by: Hussain, Omar, et al.
Published: (2012)
by: Hussain, Omar, et al.
Published: (2012)
Digital signature-based secure communication in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2011)
by: Parvin, Sazia, et al.
Published: (2011)
Towards Trust Establishment for Spectrum Selection in Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
Digital Signature-based authentication framework in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2012)
by: Parvin, Sazia, et al.
Published: (2012)
Authenticated spectrum sharing for secondary users in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
Trust-based Throughput in Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2012)
by: Parvin, Sazia, et al.
Published: (2012)
Comparative analysis of trust and security
by: Hussain, Farookh Khadeer, et al.
Published: (2006)
by: Hussain, Farookh Khadeer, et al.
Published: (2006)
Exploring personalised autonomous vehicles to influence user trust
by: Sun, Xu, et al.
Published: (2020)
by: Sun, Xu, et al.
Published: (2020)
A new discrete cosine transform-based energy detection scheme investigation using bartlett periodogram method in cognitive radio spectrum sensing
by: Barakat, Hussein Mohammed
Published: (2016)
by: Barakat, Hussein Mohammed
Published: (2016)
Strengthening user authentication for better protection of mobile application systems
by: Mohamed, Kartini, et al.
Published: (2016)
by: Mohamed, Kartini, et al.
Published: (2016)
On the technical challenges of cognitive radio in TV white spaces
by: Lodro, Mir Muhammad
Published: (2015)
by: Lodro, Mir Muhammad
Published: (2015)
Multi-point collaborative authentication method based on user image intelligent collection in the internet of things
by: Li, Yunfa, et al.
Published: (2019)
by: Li, Yunfa, et al.
Published: (2019)
Secure web services using two-way authentication and three-party key establishment for service delivery
by: Han, Song, et al.
Published: (2009)
by: Han, Song, et al.
Published: (2009)
Dynamic approaches for spectrum control in cognitive radio networks
by: Mohamedou, Ahmed
Published: (2015)
by: Mohamedou, Ahmed
Published: (2015)
Involving older people in research: practical considerations when using the authenticity criteria in constructivist inquiry
by: Brown Wilson, Christine, et al.
Published: (2011)
by: Brown Wilson, Christine, et al.
Published: (2011)
Efficient blind rendezvous schemes for cognitive radio ad-hoc networks
by: Al-Mqdashi, Abdulmajid Mohammed Ahmed
Published: (2018)
by: Al-Mqdashi, Abdulmajid Mohammed Ahmed
Published: (2018)
Privacy-preserving transactions protocol using mobile agents with mutual authentication
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
A multi-factor authentication scheme using attack recognition and key generator technique
by: Mohd Ariffin, Noor Afiza
Published: (2017)
by: Mohd Ariffin, Noor Afiza
Published: (2017)
The implementation of authentic activities for learning: a case study
by: Baccarini, David
Published: (2004)
by: Baccarini, David
Published: (2004)
Trust-based mechanisms for secure communication in cognitive radio networks
by: Parvin, Sazia
Published: (2013)
by: Parvin, Sazia
Published: (2013)
Security performance analysis of photography service system / Farah Shazwani Ismail
by: Ismail, Farah Shazwani
Published: (2019)
by: Ismail, Farah Shazwani
Published: (2019)
Building a shared authentication infrastructure: a matter of trust
by: Green, Peter
Published: (2002)
by: Green, Peter
Published: (2002)
A Framework for User Feedback Based Cloud Service Monitoring
by: Hussain, Omar, et al.
Published: (2012)
by: Hussain, Omar, et al.
Published: (2012)
Opportunistic cognitive radio network with primary user activity model
by: Mohamad, Mas Haslinda
Published: (2019)
by: Mohamad, Mas Haslinda
Published: (2019)
Incorporation Of Certification Revocation And Time Concept Into A Trust Model For Information Security System
by: Azimzadeh, Fatemeh
Published: (2007)
by: Azimzadeh, Fatemeh
Published: (2007)
Efficient, Authentication and Access control Implementation in Mobile Ad hoc Networks (MANET) as applied to Indoor Navigation Guidance System for Vision Impaired People
by: Rupasinghe, Prabath, et al.
Published: (2012)
by: Rupasinghe, Prabath, et al.
Published: (2012)
Fuzzy nature and dynamic trust modeling in service oriented environments
by: Chang, Elizabeth, et al.
Published: (2005)
by: Chang, Elizabeth, et al.
Published: (2005)
Adapting individual Cognitive Stimulation Therapy (iCST) for delivery by a touch-screen application for people with dementia
by: Rai, Harleen Kaur
Published: (2021)
by: Rai, Harleen Kaur
Published: (2021)
Exploring childhood adversity, impulsivity, and cognitive functioning within forensic populations
by: Johnson, Oliver
Published: (2025)
by: Johnson, Oliver
Published: (2025)
Neural Network-Based Approach for Predicting Trust Values Based on Non-uniform Input in Mobile Applications
by: Raza, Muhammad, et al.
Published: (2011)
by: Raza, Muhammad, et al.
Published: (2011)
Online Clothing Shopbots via Web Content Extraction / Nurul Syazwani Ramzi
by: Ramzi, Nurul Syazwani
Published: (2017)
by: Ramzi, Nurul Syazwani
Published: (2017)
Interactive 3D house marketing / Abu Bakar Mohamed
by: Mohamed, Abu Bakar
Published: (2004)
by: Mohamed, Abu Bakar
Published: (2004)
Design of a web-based LBS framework addressing usability, cost, and implementation constraints
by: Delfos, Jacob, et al.
Published: (2010)
by: Delfos, Jacob, et al.
Published: (2010)
Mobile road safety learning apps for children using digital comic and multimedia approach / Muhammad Fazli Mihsah Mohd Fazilah
by: Mohd Fazilah, Muhammad Fazli
Published: (2020)
by: Mohd Fazilah, Muhammad Fazli
Published: (2020)
Merekod markah menggunakan kod QR ke dalam sistem pendaftaran kokurikulum (marks recorded in co-curricular registration system using QR code) / Teh Faradilla Abdul Rahman dan Zamri Abu Bakar
by: Abdul Rahman, Teh Faradilla, et al.
Published: (2019)
by: Abdul Rahman, Teh Faradilla, et al.
Published: (2019)
IM-Vative sandbox: fun learning in mastering
hypertext markup language (HTML) / Izzatil Husna Arshad ...[et al.]
by: Arshad, Izzatil Husna, et al.
Published: (2020)
by: Arshad, Izzatil Husna, et al.
Published: (2020)
The cognitive styles of satisfied decision support systems users: An hypothesis
by: Williams, Robert
Published: (1999)
by: Williams, Robert
Published: (1999)
Similar Items
-
A combinational approach for trust establishment in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2011) -
Trust Based Security for Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010) -
Cognitive radio network security: A survey
by: Hussain, Omar, et al.
Published: (2012) -
Trust-based spectrum sharing for cognitive radio networks
by: Hussain, Omar, et al.
Published: (2012) -
Digital signature-based secure communication in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2011)