منابع مشابه
Spectrum sharing with secure transmission
In this paper, we propose a cooperative scheme between primary and secondary networks. In this scheme, a secondary user (SU) accepts a lease of a part of the licensed band according to a cooperative request of a primary user (PU). Hence, the SU helps the PU in transmitting primary signals and has an opportunity to access the frequency spectrum. On the other hand, the SU owns important data and ...
متن کاملAbsolutely Secure Message Transmission using a Key Sharing Graph
Assume that there are players and an eavesdropper Eve of unlimited computational power and that several pairs of players have shared secret keys beforehand. A key sharing graph is one in which each vertex corresponds to a player, and each edge corresponds to a secret key shared by the two players corresponding to the ends of the edge. Given a key sharing graph, a player wishes to send a message...
متن کاملDynamic Spectrum Sharing by Opportunistic Spectrum Access with Spectrum Aggregation
The rapid growth of wireless services and the breakneck proliferation of wireless devices continue to strain limited spectrum resource. While the need for efficient spectrum sharing mechanisms has been emphasised, opportunistic spectrum access has been considered as a promising mechanism for dynamic spectrum sharing. However, although the idle spectrum could exist, it is usually rather fragment...
متن کاملSharing @ The Edge: Secure Information Sharing
Peer-to-peer (P2P) computing promises to return the World Wide Web to an environment where the edge of the network is as important as the Web servers that have dominated its early years. This paper describes issues associated with P2P computing that must be solved before widespread deployment is possible. The paper presents a P2P solution where services and content are equally secured and can b...
متن کاملSecure Association Rule Sharing
The sharing of association rules is often beneficial in industry, but requires privacy safeguards. One may decide to disclose only part of the knowledge and conceal strategic patterns which we call restrictive rules. These restrictive rules must be protected before sharing since they are paramount for strategic decisions and need to remain private. To address this challenging problem, we propos...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: EURASIP Journal on Wireless Communications and Networking
سال: 2014
ISSN: 1687-1499
DOI: 10.1186/1687-1499-2014-134