欢迎您!
东篱公司
退出
申报数据库
申报指南
立项数据库
成果数据库
期刊论文
会议论文
著 作
专 利
项目获奖数据库
位置:
成果数据库
>
会议
> 会议详情页
Believe yourself: A user-centric misbehavior detection scheme for secure collaborative spectrum sens
所属机构名称:上海交通大学
会议名称:2011 IEEE International Conference on Communications, ICC 2011
时间:2011.6.6
成果类型:会议
相关项目:容迟网络的安全与激励机制的研究
作者:
Li, Shuai|Zhu, Haojin|Yang, Bo|Chen, Cailian|Guan, Xinping|
同会议论文项目
容迟网络的安全与激励机制的研究
期刊论文 11
会议论文 24
同项目会议论文
A Novel Attack Tree Based Risk Assessment Approach for Location Privacy Preservation in the VANETs
Towards Addressing Group Selishness of Cluster-Based Collaborative Spectrum Sensing in Cognitive Rad
YouSense: Mitigating Entropy Selfishnss in Distributed Collaborative Spectrum Sensing
Mutual Privacy-Preserving Regression Modeling in Participatory Sensing
A Localized Backbone Renovating Algorithm for Wireless Ad Hoc and Sensor Networks
PriMatch: Fairness-aware Secure Friend Discovery Protocol in Mobile Social Network
Location Privacy Preservation in Collaborative Spectrum Sensing
Leveraging Cloud Computing for Outsourced Privacy Preserving Aggregation in Multi-Domain Networks
An Adaptive Deviation-tolerant Secure Scheme for Distributed Cooperative Spectrum Sensing
L-WMxD: Lexical based Webmail XSS Discoverer
PMDS: A Probabilistic Misbehavior Detection Scheme in DTN
Towards A Game Theoretical Modeling of Rational Collaborative Spectrum Sensing in Conitive Radio Net
Location Privacy Leaking from Spectrum Utilization Information in Database-driven Cognitive Radio Ne
SDSM: A secure data service mechanism in mobile cloud computing
Location Privacy Preserving Dynamic Spectrum Auction in Cognitive Radio Networks
Location Privacy in Database-driven Cognitiv Radio Networks: Attacks and Countermeasures
Automatic inference of movements from contact histories
MobiID: A user-centric and social-aware reputation based incentive scheme for delay/disruption toler
MobiGame: A User-Centric Reputation based Incentive Protocol for Delay/Disruption Tolerant Networks
Achieving Privacy Preservation in WiFi Fingerprint-based Localiztion
Information Leaks Out: Attacks and Countermeasres on Compressive Data Gathering in Wireless Sensor N
Detecting GPS Information Leakage in Android Applications
Relative Interpersonal-Influence-Aware Routing in Buffer Constrained Delay-Tolerant Networks