Digital Library
Search Results: [ keyword: security ] (237)
Choongin Lee,
Jehyun Lee,
Youngbin Pyo,
,
Heejo Lee,
Vol. 10, No. 8, August 30, 2016
10.3837/tiis.2016.08.028
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Gang Xiong,
Yuxiang Hu,
Julong Lan,
Guozhen Cheng,
Vol. 10, No. 8, August 30, 2016
10.3837/tiis.2016.08.016
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
224.
A New Fuzzy Key Generation Method Based on PHY-Layer Fingerprints in Mobile Cognitive Radio Networks
Ning Gao,
Xiaojun Jing,
Songlin Sun,
Junsheng Mu,
Xiang Lu,
Vol. 10, No. 7, July 30, 2016
10.3837/tiis.2016.07.030
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Alavalapati Goutham Reddy,
Ashok Kumar Das,
Eun-Jun Yoon,
Kee-Young Yoo,
Vol. 10, No. 7, July 30, 2016
10.3837/tiis.2016.07.028
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Shuiqing Gong,
Jing Chen,
Conghui Huang,
Qingchao Zhu,
Siyi Zhao,
Vol. 10, No. 7, July 30, 2016
10.3837/tiis.2016.07.002
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Faheem Zafar,
Abid Khan,
Mansoor Ahmed,
Majid Iqbal Khan,
Farhana Jabeen,
Zara Hamid,
Naveed Ahmed,
Faisal Bashir,
Vol. 10, No. 6, June 29, 2016
10.3837/tiis.2016.06.022
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Run Xie,
Chunxiang Xu,
Chanlian He,
Xiaojun Zhang,
Vol. 10, No. 5, May 30, 2016
10.3837/tiis.2016.05.025
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)