×
Taking advantage of the elliptic curve cryptography technique, our protocol achieves the mutual authentication between SUs and base stations (BSs), which ...
Taking advantage of the elliptic curve cryptography technique, our protocol achieves the mutual authentication between SUs and base stations (BSs), which ...
In this paper, we propose an efficient privacy-preserving protocol to protect the identity and trajectory privacy of each SU and to prevent the database (DB) ...
Taking advantage of the elliptic curve cryptography technique, our protocol achieves the mutual authentication between SUs and base stations (BSs), which ...
An efficient privacy-preserving protocol for database-driven cognitive radio networks. Abstract. Cognitive radio is regarded as a promising technology for ...
Aug 17, 2018 · Taking advantage of the elliptic curve cryptography technique, our protocol achieves the mutual authentication between SUs and base stations ( ...
Dec 8, 2017 · UMax allows for both PUs and SUs to adjust their privacy preserving levels and optimize transmit power iteratively to achieve the maximum ...
Abstract—Cooperative spectrum sensing, despite its effective- ness in enabling dynamic spectrum access, suffers from location privacy threats, merely ...
May 6, 2019 · In this paper, we propose a lightweight privacy-preserving location verification protocol to protect the identity and location privacy of each ...
People also ask
Jun 9, 2018 · Abstract—In this paper, we propose new location privacy preserving schemes for database-driven cognitive radio networks.