Books on the topic 'Cognitive radio networks – Security measures'

To see the other types of publications on this topic, follow the link: Cognitive radio networks – Security measures.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 29 books for your research on the topic 'Cognitive radio networks – Security measures.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Beibei, Wang, ed. Cognitive radio networking and security: A game-theoretic view. Cambridge: Cambridge University Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhang, Ning, and Jon W. Mark. Security-aware Cooperation in Cognitive Radio Networks. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4939-0413-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Yan. Security in RFID and sensor networks. Boca Raton: Auerbach Publications, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Advanced security and privacy for RFID technologies. Hershey, PA: Information Science Reference, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lopez, Pedro Peris, Julio C. Hernandez-Castro, and Tieyan Li. Security and trends in wireless identification and sensing platform tags: Advancements in RFID. Hershey, PA: Information Science Reference, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

International Conference on Anti-Counterfeiting, Security, and Identification (2nd 2008 Guiyang, China). Proceedings of the 2nd international conference on anti-counterfeiting, security, and identification: 2008 ASID. [Piscataway, N.J: IEEE], 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

International Conference on Anti-Counterfeiting, Security, and Identification (2nd 2008 Guiyang, China). Proceedings of the 2nd international conference on anti-counterfeiting, security, and identification: 2008 ASID. [Piscataway, N.J: IEEE], 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

IEEE International Workshop on Anti-Counterfeiting, Security, Identification (2007 Xiamen Shi, China). 2007 International Workshop on Anti-counterfeiting, Security, Identification: Xiamen, China, 16-18 April 2007. Piscataway, N.J: IEEE, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Camenisch, Jan. Open Research Problems in Network Security: IFIP WG 11.4 International Workshop, iNetSec 2010, Sofia, Bulgaria, March 5-6, 2010, Revised Selected Papers. Berlin, Heidelberg: IFIP International Federation for Information Processing, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

International, Conference on Anti-Counterfeiting Security and Identification (3rd 2009 Hong Kong China). Proceedings of the 3rd international conference on anti-counterfeiting, security, and identification in comunication: 2009 ASID : August 20-22, 2009, City University of Hong Kong, Hong Kong, China. [Piscataway, N.J: IEEE], 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

International Conference on Anti-Counterfeiting, Security, and Identification (3rd 2009 Hong Kong, China). Proceedings of the 3rd international conference on anti-counterfeiting, security, and identification in comunication: 2009 ASID : August 20-22, 2009, City University of Hong Kong, Hong Kong, China. [Piscataway, N.J: IEEE], 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

International, Conference on Anti-Counterfeiting Security and Identification (3rd 2009 Hong Kong China). Proceedings of the 3rd international conference on anti-counterfeiting, security, and identification in comunication: 2009 ASID : August 20-22, 2009, City University of Hong Kong, Hong Kong, China. [Piscataway, N.J: IEEE], 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Transparent user authentication: Biometrics, RFID and behavioural profiling. London: Springer, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Wu xian wang luo yu yi dong tong xin de zi yuan, yi dong yu an quan guan li: Resource, mobility, and security management in wireless networks and mobile communications. Beijing Shi: Dian zi gong ye chu ban she, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Yalcin, Siddika Berna Ors. Radio Frequency Identification: Security and Privacy Issues: 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

American Library Association. Office for Intellectual Freedom. Privacy and freedom of information in 21st-century libraries. Chicago, IL: ALA TechSource, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Securityaware Cooperation In Cognitive Radio Networks. Springer-Verlag New York Inc., 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Mark, Jon W., and Ning Zhang. Security-aware Cooperation in Cognitive Radio Networks. Springer, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Mark, Jon W., and Ning Zhang. Security-Aware Cooperation in Cognitive Radio Networks. Springer London, Limited, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Mucchi, L. Security for Cognitive Wireless Networks. Wiley & Sons, Incorporated, John, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Kitsos, Paris. Security in Rfid and Sensor Networks. Taylor & Francis Group, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Kitsos, Paris. Security in RFID and Sensor Networks. Auerbach Publishers, Incorporated, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Kitsos, Paris. Security in RFID and Sensor Networks. Auerbach Publishers, Incorporated, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Security in RFID and Sensor Networks. AUERBACH, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Kitsos, Paris. Security in Rfid and Sensor Networks. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Markantonakis, Konstantinos, and Gerhard P. Hancke. Radio Frequency Identification and IoT Security: 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 -- December 2, 2016, Revised ... Springer, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

(Editor), Yan Zhang, Honglin Hu (Editor), and Masayuki Fujise (Editor), eds. Resource, Mobility, and Security Management in Wireless Networks and Mobile Communications. AUERBACH, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Clarke, Nathan. Transparent User Authentication: Biometrics, RFID and Behavioural Profiling. Springer London, Limited, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Clarke, Nathan. Transparent User Authentication. Springer, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography