Digital signature-based secure communication in cognitive radio networks
Due to the rapid growth of wireless applications, Cognitive Radio (CR) has been considered as a demanding concept for improving the utilization of limited radio spectrum resources for future wireless communications and mobile computing. The unique characteristics of Cognitive Radio Networks (CRNs) m...
| Main Authors: | Parvin, Sazia, Hussain, Farookh Khadeer |
|---|---|
| Other Authors: | Fatos Xhafa |
| Format: | Conference Paper |
| Published: |
Conference Publishing Service
2011
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/20363 |
Similar Items
Trust-Based Authentication for Secure Communication in Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
Trust Based Security for Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
A combinational approach for trust establishment in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2011)
by: Parvin, Sazia, et al.
Published: (2011)
Digital Signature-based authentication framework in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2012)
by: Parvin, Sazia, et al.
Published: (2012)
Towards Trust Establishment for Spectrum Selection in Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
Cognitive radio network security: A survey
by: Hussain, Omar, et al.
Published: (2012)
by: Hussain, Omar, et al.
Published: (2012)
Trust-based spectrum sharing for cognitive radio networks
by: Hussain, Omar, et al.
Published: (2012)
by: Hussain, Omar, et al.
Published: (2012)
Trust-based Throughput in Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2012)
by: Parvin, Sazia, et al.
Published: (2012)
Authenticated spectrum sharing for secondary users in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
A Secure Key Management Model for Wireless Mesh Networks
by: Gao, Li, et al.
Published: (2010)
by: Gao, Li, et al.
Published: (2010)
An attack on undeniable partially blind signatures
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
A new proxy signature scheme as secure as EIGamal signature
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
A New "F-Lueg" Cryptosystem and its Security
by: Choo, Mun Yoong
Published: (2002)
by: Choo, Mun Yoong
Published: (2002)
Improvement of a convertible undeniable partially blind signature scheme
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
An efficient identity-based group signature scheme over elliptic curves
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
Privacy-preserving transactions protocol using mobile agents with mutual authentication
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
Practical fair anonymous undeniable signatures
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
New proxy signatures with message recovery using pairing
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
A new discrete cosine transform-based energy detection scheme investigation using bartlett periodogram method in cognitive radio spectrum sensing
by: Barakat, Hussein Mohammed
Published: (2016)
by: Barakat, Hussein Mohammed
Published: (2016)
A multi-factor authentication scheme using attack recognition and key generator technique
by: Mohd Ariffin, Noor Afiza
Published: (2017)
by: Mohd Ariffin, Noor Afiza
Published: (2017)
A Key Management Protocol for Multiphase Hierarchical Wireless Sensor Networks
by: Tian, Biming, et al.
Published: (2010)
by: Tian, Biming, et al.
Published: (2010)
Secure web services using two-way authentication and three-party key establishment for service delivery
by: Han, Song, et al.
Published: (2009)
by: Han, Song, et al.
Published: (2009)
Security performance analysis of photography service system / Farah Shazwani Ismail
by: Ismail, Farah Shazwani
Published: (2019)
by: Ismail, Farah Shazwani
Published: (2019)
A Framework for User Feedback Based Cloud Service Monitoring
by: Hussain, Omar, et al.
Published: (2012)
by: Hussain, Omar, et al.
Published: (2012)
Efficient blind rendezvous schemes for cognitive radio ad-hoc networks
by: Al-Mqdashi, Abdulmajid Mohammed Ahmed
Published: (2018)
by: Al-Mqdashi, Abdulmajid Mohammed Ahmed
Published: (2018)
An innovative reputation system for trustworthy and secure vehicle-to-vehicle communication
by: Almani, Dimah
Published: (2025)
by: Almani, Dimah
Published: (2025)
Committal deniable signatures over elliptic curves
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
Dynamic approaches for spectrum control in cognitive radio networks
by: Mohamedou, Ahmed
Published: (2015)
by: Mohamedou, Ahmed
Published: (2015)
Domesticating home networks
by: Brown, Anthony
Published: (2016)
by: Brown, Anthony
Published: (2016)
Mobile road safety learning apps for children using digital comic and multimedia approach / Muhammad Fazli Mihsah Mohd Fazilah
by: Mohd Fazilah, Muhammad Fazli
Published: (2020)
by: Mohd Fazilah, Muhammad Fazli
Published: (2020)
A pairing-based blind signature scheme with message recovery
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Opportunistic cognitive radio network with primary user activity model
by: Mohamad, Mas Haslinda
Published: (2019)
by: Mohamad, Mas Haslinda
Published: (2019)
Multi-point collaborative authentication method based on user image intelligent collection in the internet of things
by: Li, Yunfa, et al.
Published: (2019)
by: Li, Yunfa, et al.
Published: (2019)
Adapting individual Cognitive Stimulation Therapy (iCST) for delivery by a touch-screen application for people with dementia
by: Rai, Harleen Kaur
Published: (2021)
by: Rai, Harleen Kaur
Published: (2021)
Strengthening user authentication for better protection of mobile application systems
by: Mohamed, Kartini, et al.
Published: (2016)
by: Mohamed, Kartini, et al.
Published: (2016)
Exploring childhood adversity, impulsivity, and cognitive functioning within forensic populations
by: Johnson, Oliver
Published: (2025)
by: Johnson, Oliver
Published: (2025)
An efficient algorithm for exact computation of system and survival signatures using binary decision diagrams
by: Reed, Sean
Published: (2017)
by: Reed, Sean
Published: (2017)
Trust-based mechanisms for secure communication in cognitive radio networks
by: Parvin, Sazia
Published: (2013)
by: Parvin, Sazia
Published: (2013)
Self-Healing Key Distribution Schemes for Wireless Networks: A Survey
by: Tian, Biming, et al.
Published: (2011)
by: Tian, Biming, et al.
Published: (2011)
On the technical challenges of cognitive radio in TV white spaces
by: Lodro, Mir Muhammad
Published: (2015)
by: Lodro, Mir Muhammad
Published: (2015)
Similar Items
-
Trust-Based Authentication for Secure Communication in Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010) -
Trust Based Security for Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010) -
A combinational approach for trust establishment in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2011) -
Digital Signature-based authentication framework in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2012) -
Towards Trust Establishment for Spectrum Selection in Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010)