1 |
J. Mitola, "Cognitive Radio for Flexible Mobile Multimedia Communications," Mobile Network and Applications, Vol. 6, No. 5, pp. 435-441, 2001.
DOI
ScienceOn
|
2 |
H. Kim, "Security Standard Status for Cognitive Radio Networks-focused on IEEE 802.22 WRAN," Review of KIISC, Vol, 19, No. 5, pp. 65-69, 2009.
|
3 |
H. Kim, S. W. Lee, "Investigations of Security Framework for Cognitive Radio Network focused on IEEE 802.22 WRAN," Journal of Security Engineering, Vol. 6, No. 1, pp. 25-38, 2009.
|
4 |
I. F. Akyildiz, W. Lee, and K. R. Chowdhury, "CRAHNs: Cognitive radio ad hoc networks," AD hoc networks, Vol. 7, pp. 810-836, 2009.
DOI
ScienceOn
|
5 |
IEEE 802.22, IEEE P802.22/D1.0 draft standard for wireless regional area networks part 22: Cognitive wireless RAN medium access control(MAC) and physical layer(PHY) specifications: Policies and procedures for operation in the TV bands, Apr. 2008.
|
6 |
J. Wang, M. S. Song, S. Santhiveeran, K. Lim, S. H. Hwang, M. Ghosh, V. Gaddam, and K. Challapali, "First Cognitive Radio Networking Standard for Personal/Portable Devices in TV White Spaces," Ecma/TC48-TG1/2009/132, white paper, 2009.
|
7 |
D. Jang, H. Kim, "Security Standardization Status of Ecma-International for Personal/ Portable Devices supporting Cognitive Radio Networking," Journal of Security Engineering, Vol. 8, No. 5, pp. 553-565, 2011.
|
8 |
T. C. Clancy, N. Goergen, "Security in cognitive radio networks: Threats and mitigation," Proc. of CrownCom 2008, pp. 1-8, 2008.
|
9 |
R. Chen, J. Park, "Ensuring trustworth spectrum sensing in cognitive radio networks," IEEE Workshop on Networking Technologies for SDR 2006, pp. 110-119, 2006.
|
10 |
H. Kim, "Design of Security Framework for Cognitive Radio Network," Proc. of 2012 Conference on Convergence/Smart/Cloud computing, pp. 23-27, 2012.
|
11 |
H. Kim, "Security Aspects Analysis for Secondary User Authentication over Cognitive Radio Network," Proc. of 2013 Conference on Convergence/Smart/Cloud computing, pp. 56-59, 2014.
|
12 |
H. Kim, "Analysis on Delegation-based Authentication Protocol for Wireless Roaming Service," Proc. of 2014 Conference on Convergence/Smart/Cloud computing, pp. 83-86, 2014.
|
13 |
H. Kim, "Design of Adaptive Security Framework based on Carousel for Cognitive Radio Network," Journal of The Institute of Electronics Engineers of Korea, Vol. 50, No. 5, pp. 165-172, 2013.
과학기술학회마을
DOI
ScienceOn
|
14 |
H. Kim, "Location-based authentication protocol for first cognitive radio networking standard," Journal of Network and Computer Applications, Vol. 34, pp. 1160-1167, 2011.
DOI
ScienceOn
|
15 |
BWN Lab. GeorgiaTech, http://www.ece.gatech.edu/research/labs/bwn.
|
16 |
W. B. Lee, C. K. Yeh, "A new delegation-based authentication protocol for use in portable communication systems," IEEE Transactions on Wireless Communications, Vol. 4, No. 1, pp. 57-64, 2005.
DOI
ScienceOn
|
17 |
C. Tang, D. O. Wu, "An efficient mobile authentication scheme for wireless networks," IEEE Transactions on Wireless Communications, Vol. 7, No. 4, pp. 1408-1416, 2008.
DOI
ScienceOn
|
18 |
J. L. Tsai, N. W. Lo, T. C. Wu, "Secure Delegation-Based Authentication Protocol for Wireless Roaming Service," IEEE Communications Letters, Vol. 16, No. 7, pp. 1100-1102, 2012.
DOI
ScienceOn
|
19 |
P. Kocher, J. Jaffe, B. Jun, "Differential Power Analysis", Lecture Notes in Computer Science, Vol. 1666, pp. 388-397, 1999.
|
20 |
F. X. Standaert, T. G. Malkin, M. Yung, "A unified framework for the analysis of side-channel key recovery attacks," Lecture Notes in Computer Science, Vol. 5479, pp. 443-461, 2009.
|