Spectrum sharing with secure transmission

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Spectrum sharing with secure transmission

In this paper, we propose a cooperative scheme between primary and secondary networks. In this scheme, a secondary user (SU) accepts a lease of a part of the licensed band according to a cooperative request of a primary user (PU). Hence, the SU helps the PU in transmitting primary signals and has an opportunity to access the frequency spectrum. On the other hand, the SU owns important data and ...

متن کامل

Absolutely Secure Message Transmission using a Key Sharing Graph

Assume that there are players and an eavesdropper Eve of unlimited computational power and that several pairs of players have shared secret keys beforehand. A key sharing graph is one in which each vertex corresponds to a player, and each edge corresponds to a secret key shared by the two players corresponding to the ends of the edge. Given a key sharing graph, a player wishes to send a message...

متن کامل

Dynamic Spectrum Sharing by Opportunistic Spectrum Access with Spectrum Aggregation

The rapid growth of wireless services and the breakneck proliferation of wireless devices continue to strain limited spectrum resource. While the need for efficient spectrum sharing mechanisms has been emphasised, opportunistic spectrum access has been considered as a promising mechanism for dynamic spectrum sharing. However, although the idle spectrum could exist, it is usually rather fragment...

متن کامل

Sharing @ The Edge: Secure Information Sharing

Peer-to-peer (P2P) computing promises to return the World Wide Web to an environment where the edge of the network is as important as the Web servers that have dominated its early years. This paper describes issues associated with P2P computing that must be solved before widespread deployment is possible. The paper presents a P2P solution where services and content are equally secured and can b...

متن کامل

Secure Association Rule Sharing

The sharing of association rules is often beneficial in industry, but requires privacy safeguards. One may decide to disclose only part of the knowledge and conceal strategic patterns which we call restrictive rules. These restrictive rules must be protected before sharing since they are paramount for strategic decisions and need to remain private. To address this challenging problem, we propos...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: EURASIP Journal on Wireless Communications and Networking

سال: 2014

ISSN: 1687-1499

DOI: 10.1186/1687-1499-2014-134