Security Analysis of Overlay Cognitive Wireless Networks with an Untrusted Secondary User.
Mu LiMianquan LiYuzhen HuangHao YinYan WangBaoquan RenXiaofei QuRui YuPublished in: ICSPCC (2018)
Keyphrases
- wireless networks
- security analysis
- user authentication
- heterogeneous wireless networks
- wireless communication
- public key
- ad hoc networks
- smart card
- cognitive radio
- security requirements
- multimedia services
- information systems
- wireless technologies
- wireless ad hoc networks
- encryption algorithm
- image compression
- video sequences