Books on the topic 'Cognitive radio networks – Security measures'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 29 books for your research on the topic 'Cognitive radio networks – Security measures.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Beibei, Wang, ed. Cognitive radio networking and security: A game-theoretic view. Cambridge: Cambridge University Press, 2010.
Find full textZhang, Ning, and Jon W. Mark. Security-aware Cooperation in Cognitive Radio Networks. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4939-0413-6.
Full textZhang, Yan. Security in RFID and sensor networks. Boca Raton: Auerbach Publications, 2009.
Find full textAdvanced security and privacy for RFID technologies. Hershey, PA: Information Science Reference, 2013.
Find full textLopez, Pedro Peris, Julio C. Hernandez-Castro, and Tieyan Li. Security and trends in wireless identification and sensing platform tags: Advancements in RFID. Hershey, PA: Information Science Reference, 2013.
Find full textInternational Conference on Anti-Counterfeiting, Security, and Identification (2nd 2008 Guiyang, China). Proceedings of the 2nd international conference on anti-counterfeiting, security, and identification: 2008 ASID. [Piscataway, N.J: IEEE], 2008.
Find full textInternational Conference on Anti-Counterfeiting, Security, and Identification (2nd 2008 Guiyang, China). Proceedings of the 2nd international conference on anti-counterfeiting, security, and identification: 2008 ASID. [Piscataway, N.J: IEEE], 2008.
Find full textIEEE International Workshop on Anti-Counterfeiting, Security, Identification (2007 Xiamen Shi, China). 2007 International Workshop on Anti-counterfeiting, Security, Identification: Xiamen, China, 16-18 April 2007. Piscataway, N.J: IEEE, 2007.
Find full textCamenisch, Jan. Open Research Problems in Network Security: IFIP WG 11.4 International Workshop, iNetSec 2010, Sofia, Bulgaria, March 5-6, 2010, Revised Selected Papers. Berlin, Heidelberg: IFIP International Federation for Information Processing, 2011.
Find full textInternational, Conference on Anti-Counterfeiting Security and Identification (3rd 2009 Hong Kong China). Proceedings of the 3rd international conference on anti-counterfeiting, security, and identification in comunication: 2009 ASID : August 20-22, 2009, City University of Hong Kong, Hong Kong, China. [Piscataway, N.J: IEEE], 2009.
Find full textInternational Conference on Anti-Counterfeiting, Security, and Identification (3rd 2009 Hong Kong, China). Proceedings of the 3rd international conference on anti-counterfeiting, security, and identification in comunication: 2009 ASID : August 20-22, 2009, City University of Hong Kong, Hong Kong, China. [Piscataway, N.J: IEEE], 2009.
Find full textInternational, Conference on Anti-Counterfeiting Security and Identification (3rd 2009 Hong Kong China). Proceedings of the 3rd international conference on anti-counterfeiting, security, and identification in comunication: 2009 ASID : August 20-22, 2009, City University of Hong Kong, Hong Kong, China. [Piscataway, N.J: IEEE], 2009.
Find full textTransparent user authentication: Biometrics, RFID and behavioural profiling. London: Springer, 2011.
Find full textWu xian wang luo yu yi dong tong xin de zi yuan, yi dong yu an quan guan li: Resource, mobility, and security management in wireless networks and mobile communications. Beijing Shi: Dian zi gong ye chu ban she, 2008.
Find full textYalcin, Siddika Berna Ors. Radio Frequency Identification: Security and Privacy Issues: 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010.
Find full textAmerican Library Association. Office for Intellectual Freedom. Privacy and freedom of information in 21st-century libraries. Chicago, IL: ALA TechSource, 2010.
Find full textSecurityaware Cooperation In Cognitive Radio Networks. Springer-Verlag New York Inc., 2014.
Find full textMark, Jon W., and Ning Zhang. Security-aware Cooperation in Cognitive Radio Networks. Springer, 2014.
Find full textMark, Jon W., and Ning Zhang. Security-Aware Cooperation in Cognitive Radio Networks. Springer London, Limited, 2014.
Find full textMucchi, L. Security for Cognitive Wireless Networks. Wiley & Sons, Incorporated, John, 2018.
Find full textKitsos, Paris. Security in Rfid and Sensor Networks. Taylor & Francis Group, 2009.
Find full textKitsos, Paris. Security in RFID and Sensor Networks. Auerbach Publishers, Incorporated, 2016.
Find full textKitsos, Paris. Security in RFID and Sensor Networks. Auerbach Publishers, Incorporated, 2016.
Find full textSecurity in RFID and Sensor Networks. AUERBACH, 2009.
Find full textKitsos, Paris. Security in Rfid and Sensor Networks. Taylor & Francis Group, 2019.
Find full textMarkantonakis, Konstantinos, and Gerhard P. Hancke. Radio Frequency Identification and IoT Security: 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 -- December 2, 2016, Revised ... Springer, 2017.
Find full text(Editor), Yan Zhang, Honglin Hu (Editor), and Masayuki Fujise (Editor), eds. Resource, Mobility, and Security Management in Wireless Networks and Mobile Communications. AUERBACH, 2006.
Find full textClarke, Nathan. Transparent User Authentication: Biometrics, RFID and Behavioural Profiling. Springer London, Limited, 2014.
Find full textClarke, Nathan. Transparent User Authentication. Springer, 2011.
Find full text