A combinational approach for trust establishment in cognitive radio networks
Cognitive Radio is considered as a promising and demanding technology to examine whether a particular radio spectrum band is currently in use or not and to switch into the temporarily unoccupied spectrum band in order to improve the usage of the radio electromagnetic spectrum without creating interf...
| Main Authors: | Parvin, Sazia, Han, Song, Hussain, Farookh Khadeer, Tian, Biming |
|---|---|
| Other Authors: | Leonard Barolli |
| Format: | Conference Paper |
| Published: |
Conference Publishing Service
2011
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/19506 |
Similar Items
Trust-Based Authentication for Secure Communication in Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
Trust Based Security for Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
Towards Trust Establishment for Spectrum Selection in Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
Trust-based spectrum sharing for cognitive radio networks
by: Hussain, Omar, et al.
Published: (2012)
by: Hussain, Omar, et al.
Published: (2012)
Cognitive radio network security: A survey
by: Hussain, Omar, et al.
Published: (2012)
by: Hussain, Omar, et al.
Published: (2012)
Digital signature-based secure communication in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2011)
by: Parvin, Sazia, et al.
Published: (2011)
Digital Signature-based authentication framework in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2012)
by: Parvin, Sazia, et al.
Published: (2012)
Authenticated spectrum sharing for secondary users in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
Trust-based Throughput in Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2012)
by: Parvin, Sazia, et al.
Published: (2012)
Comparative analysis of trust and security
by: Hussain, Farookh Khadeer, et al.
Published: (2006)
by: Hussain, Farookh Khadeer, et al.
Published: (2006)
Exploring personalised autonomous vehicles to influence user trust
by: Sun, Xu, et al.
Published: (2020)
by: Sun, Xu, et al.
Published: (2020)
A new discrete cosine transform-based energy detection scheme investigation using bartlett periodogram method in cognitive radio spectrum sensing
by: Barakat, Hussein Mohammed
Published: (2016)
by: Barakat, Hussein Mohammed
Published: (2016)
On the technical challenges of cognitive radio in TV white spaces
by: Lodro, Mir Muhammad
Published: (2015)
by: Lodro, Mir Muhammad
Published: (2015)
Dynamic approaches for spectrum control in cognitive radio networks
by: Mohamedou, Ahmed
Published: (2015)
by: Mohamedou, Ahmed
Published: (2015)
Efficient blind rendezvous schemes for cognitive radio ad-hoc networks
by: Al-Mqdashi, Abdulmajid Mohammed Ahmed
Published: (2018)
by: Al-Mqdashi, Abdulmajid Mohammed Ahmed
Published: (2018)
A Framework for User Feedback Based Cloud Service Monitoring
by: Hussain, Omar, et al.
Published: (2012)
by: Hussain, Omar, et al.
Published: (2012)
Opportunistic cognitive radio network with primary user activity model
by: Mohamad, Mas Haslinda
Published: (2019)
by: Mohamad, Mas Haslinda
Published: (2019)
Fuzzy nature and dynamic trust modeling in service oriented environments
by: Chang, Elizabeth, et al.
Published: (2005)
by: Chang, Elizabeth, et al.
Published: (2005)
Trust-based mechanisms for secure communication in cognitive radio networks
by: Parvin, Sazia
Published: (2013)
by: Parvin, Sazia
Published: (2013)
Security performance analysis of photography service system / Farah Shazwani Ismail
by: Ismail, Farah Shazwani
Published: (2019)
by: Ismail, Farah Shazwani
Published: (2019)
Adapting individual Cognitive Stimulation Therapy (iCST) for delivery by a touch-screen application for people with dementia
by: Rai, Harleen Kaur
Published: (2021)
by: Rai, Harleen Kaur
Published: (2021)
Exploring childhood adversity, impulsivity, and cognitive functioning within forensic populations
by: Johnson, Oliver
Published: (2025)
by: Johnson, Oliver
Published: (2025)
Neural Network-Based Approach for Predicting Trust Values Based on Non-uniform Input in Mobile Applications
by: Raza, Muhammad, et al.
Published: (2011)
by: Raza, Muhammad, et al.
Published: (2011)
Incorporation Of Certification Revocation And Time Concept Into A Trust Model For Information Security System
by: Azimzadeh, Fatemeh
Published: (2007)
by: Azimzadeh, Fatemeh
Published: (2007)
Involving older people in research: practical considerations when using the authenticity criteria in constructivist inquiry
by: Brown Wilson, Christine, et al.
Published: (2011)
by: Brown Wilson, Christine, et al.
Published: (2011)
Online Clothing Shopbots via Web Content Extraction / Nurul Syazwani Ramzi
by: Ramzi, Nurul Syazwani
Published: (2017)
by: Ramzi, Nurul Syazwani
Published: (2017)
Interactive 3D house marketing / Abu Bakar Mohamed
by: Mohamed, Abu Bakar
Published: (2004)
by: Mohamed, Abu Bakar
Published: (2004)
Design of a web-based LBS framework addressing usability, cost, and implementation constraints
by: Delfos, Jacob, et al.
Published: (2010)
by: Delfos, Jacob, et al.
Published: (2010)
Mobile road safety learning apps for children using digital comic and multimedia approach / Muhammad Fazli Mihsah Mohd Fazilah
by: Mohd Fazilah, Muhammad Fazli
Published: (2020)
by: Mohd Fazilah, Muhammad Fazli
Published: (2020)
Merekod markah menggunakan kod QR ke dalam sistem pendaftaran kokurikulum (marks recorded in co-curricular registration system using QR code) / Teh Faradilla Abdul Rahman dan Zamri Abu Bakar
by: Abdul Rahman, Teh Faradilla, et al.
Published: (2019)
by: Abdul Rahman, Teh Faradilla, et al.
Published: (2019)
IM-Vative sandbox: fun learning in mastering
hypertext markup language (HTML) / Izzatil Husna Arshad ...[et al.]
by: Arshad, Izzatil Husna, et al.
Published: (2020)
by: Arshad, Izzatil Husna, et al.
Published: (2020)
The cognitive styles of satisfied decision support systems users: An hypothesis
by: Williams, Robert
Published: (1999)
by: Williams, Robert
Published: (1999)
Malaysian Female Pre-Service Teachers Online: Exploring Their Internet Use And Attitudes
by: Wong, Su Luan, et al.
Published: (2005)
by: Wong, Su Luan, et al.
Published: (2005)
Energy detection for spectrum sensing in OFDM-based cooperative and non-cooperative radio networks
by: Salman, Emad Hmood
Published: (2018)
by: Salman, Emad Hmood
Published: (2018)
Throughput analysis of full-duplex communication cognitive radio network
by: Lodro, Mir Muhammad, et al.
Published: (2017)
by: Lodro, Mir Muhammad, et al.
Published: (2017)
User contribution measurement model for web-based discussion forums
by: Chai, Kevin, et al.
Published: (2009)
by: Chai, Kevin, et al.
Published: (2009)
Only behavioral but not self-report measures of speech perception correlate with cognitive abilities
by: Heinrich, Antje, et al.
Published: (2016)
by: Heinrich, Antje, et al.
Published: (2016)
Self-Healing Key Distribution Schemes for Wireless Networks: A Survey
by: Tian, Biming, et al.
Published: (2011)
by: Tian, Biming, et al.
Published: (2011)
Scheduling and bandwidth allocation in cognitive radio sensor networks
by: Al-Medhwahi, Mohammed Ahmed Ali
Published: (2018)
by: Al-Medhwahi, Mohammed Ahmed Ali
Published: (2018)
Early findings from a large-scale user study of CHESTNUT: Validations and implications
by: Peng, Xiangjun, et al.
Published: (2020)
by: Peng, Xiangjun, et al.
Published: (2020)
Similar Items
-
Trust-Based Authentication for Secure Communication in Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010) -
Trust Based Security for Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010) -
Towards Trust Establishment for Spectrum Selection in Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010) -
Trust-based spectrum sharing for cognitive radio networks
by: Hussain, Omar, et al.
Published: (2012) -
Cognitive radio network security: A survey
by: Hussain, Omar, et al.
Published: (2012)