Digital Library
Vol. 4, No. 3, June 29, 2010
[Regular Papers]
Others
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Cognitive radios
- spectrum sharing
- cooperative communication
- decode-and-forward relaying
- selection combining
- outage probability
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- cognitive radio
- cooperative spectrum sensing
- data fusion
- fuzzy logic inference system
- presence possibility
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Identity-Based Encryption
- Broadcast Encryption
- threshold broadcast encryption
- Provable Security
- standard model
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Anomaly Detection
- Distributed Denial of Service
- Kalman filter
- Recursive least square
- router-wide traffic analysis
Archives