Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Dynamic access control: preserving safety and trust for network defense operations
Proceedings of the eighth ACM symposium on Access control models and technologies
Establishing trust in pure ad-hoc networks
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
Ad Hoc Wireless Networks: Architectures and Protocols
Ad Hoc Wireless Networks: Architectures and Protocols
Towards designing a trusted routing solution in mobile ad hoc networks
Mobile Networks and Applications
NeXt generation/dynamic spectrum access/cognitive radio wireless networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
A survey on peer-to-peer key management for mobile ad hoc networks
ACM Computing Surveys (CSUR)
Cognitive radio network architecture: part I -- general structure
Proceedings of the 2nd international conference on Ubiquitous information management and communication
A SURVEY OF INTEGRATING IP MOBILITY PROTOCOLS AND MOBILE AD HOC NETWORKS
IEEE Communications Surveys & Tutorials
A survey of security issues in mobile ad hoc and sensor networks
IEEE Communications Surveys & Tutorials
End-to-end QoS provisioning in mobile heterogeneous networks
IEEE Wireless Communications
IEEE Wireless Communications
IEEE Communications Magazine - Part Anniversary
Cognitive radio: brain-empowered wireless communications
IEEE Journal on Selected Areas in Communications
On trust models and trust evaluation metrics for ad hoc networks
IEEE Journal on Selected Areas in Communications
Towards a trust aware cognitive radio architecture
ACM SIGMOBILE Mobile Computing and Communications Review
Connectivity based cognitive wireless network for disaster information network
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
Novel access and remediation scheme in hierarchical trusted network
Computer Communications
Trust based security for cognitive radio networks
Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services
Wireless Personal Communications: An International Journal
User policy based transmission control method in cognitive wireless network
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part III
Review: Cognitive radio network security: A survey
Journal of Network and Computer Applications
Digital signature-based authentication framework in cognitive radio networks
Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia
Secure Distributed Routing Algorithm with Optimizing Energy Consumption for Cognitive Radio Networks
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
Cognitive radios shall form cognitive radio network (CRN) to complete the packets delivery. As cognitive radio network is a general multihop wireless heterogeneous network, trust becomes a critical factor for network layer functions and network operation. We explore and develop the mathematical framework of trust in CRN, to further develop trusted routing with relevant explorations on network layer and above functions.