Secure Communications with Untrusted Secondary Users in Cognitive Radio Networks

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 287
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorHa, Jeongseokko
dc.contributor.authorJeon, Hyoungsukko
dc.contributor.authorMcLaughlin, Steven W.ko
dc.date.accessioned2013-12-06T01:13:29Z-
dc.date.available2013-12-06T01:13:29Z-
dc.date.created2013-10-10-
dc.date.created2013-10-10-
dc.date.issued2012-12-05-
dc.identifier.citationIEEE GLOBECOM-
dc.identifier.issn1930-529X-
dc.identifier.urihttp://hdl.handle.net/10203/182778-
dc.languageEnglish-
dc.publisherIEEE-
dc.titleSecure Communications with Untrusted Secondary Users in Cognitive Radio Networks-
dc.typeConference-
dc.identifier.scopusid2-s2.0-84877667488-
dc.type.rimsCONF-
dc.citation.publicationnameIEEE GLOBECOM-
dc.identifier.conferencecountryUS-
dc.identifier.conferencelocationCalifornia-
dc.contributor.localauthorHa, Jeongseok-
dc.contributor.nonIdAuthorJeon, Hyoungsuk-
dc.contributor.nonIdAuthorMcLaughlin, Steven W.-
Appears in Collection
EE-Conference Papers(학술회의논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0