Academic literature on the topic 'Spectrum Access System Privacy'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Spectrum Access System Privacy.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Spectrum Access System Privacy"
Clark, Matthew A., and Konstantinos Psounis. "Trading Utility for Privacy in Shared Spectrum Access Systems." IEEE/ACM Transactions on Networking 26, no. 1 (February 2018): 259–73. http://dx.doi.org/10.1109/tnet.2017.2778260.
Full textZhang, Mengyuan, Jiming Chen, Shibo He, Lei Yang, Xiaowen Gong, and Junshan Zhang. "Privacy-Preserving Database Assisted Spectrum Access for Industrial Internet of Things: A Distributed Learning Approach." IEEE Transactions on Industrial Electronics 67, no. 8 (August 2020): 7094–103. http://dx.doi.org/10.1109/tie.2019.2938491.
Full textAhmed, Iqrar, Heikki Karvonen, Timo Kumpuniemi, and Marcos Katz. "Wireless Communications for the Hospital of the Future: Requirements, Challenges and Solutions." International Journal of Wireless Information Networks 27, no. 1 (October 28, 2019): 4–17. http://dx.doi.org/10.1007/s10776-019-00468-1.
Full textSun, Guiling, Weijian Zhao, Ruobin Wang, and Xuanjie Li. "Design of Ethernet-VLC Data Conversion System Based on FPGA." International Journal of Computer Theory and Engineering 12, no. 3 (2020): 69–73. http://dx.doi.org/10.7763/ijcte.2020.v12.1266.
Full textVorakulpipat, Chalee, Soontorn Sirapaisan, Ekkachan Rattanalerdnusorn, and Visut Savangsuk. "A Policy-Based Framework for Preserving Confidentiality in BYOD Environments: A Review of Information Security Perspectives." Security and Communication Networks 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/2057260.
Full textZong Chen, Joy Iong, and Kong-Long Lai. "Internet of Things (IoT) Authentication and Access Control by Hybrid Deep Learning Method - A Study." December 2020 2, no. 4 (January 19, 2021): 236–45. http://dx.doi.org/10.36548/jscp.2020.4.005.
Full textMitrea, Teodor, Vlad Vasile, and Monica Borda. "Mobile Applications - (in) Security Overview." International conference KNOWLEDGE-BASED ORGANIZATION 25, no. 3 (June 1, 2019): 42–45. http://dx.doi.org/10.2478/kbo-2019-0115.
Full textSzydłowski, Dariusz, and Kamil Martyniak. "Contemporary threats related to content processing in the cyberspace." ASEJ Scientific Journal of Bielsko-Biala School of Finance and Law 23, no. 1 (April 30, 2019): 13–17. http://dx.doi.org/10.5604/01.3001.0013.1759.
Full textPetrenko, Christie LM, Jennifer Parr, Carson Kautz, Cristiano Tapparello, and Heather Carmichael Olson. "A Mobile Health Intervention for Fetal Alcohol Spectrum Disorders (Families Moving Forward Connect): Development and Qualitative Evaluation of Design and Functionalities." JMIR mHealth and uHealth 8, no. 4 (April 6, 2020): e14721. http://dx.doi.org/10.2196/14721.
Full textGwynette, McLeod Frampton, Danielle Morriss, Nancy Warren, James Truelove, Jennifer Warthen, Charles Paul Ross, George Mood, Charlotte Anne Snook, and Jeffrey Borckardt. "Social Skills Training for Adolescents With Autism Spectrum Disorder Using Facebook (Project Rex Connect): A Survey Study." JMIR Mental Health 4, no. 1 (January 23, 2017): e4. http://dx.doi.org/10.2196/mental.6605.
Full textDissertations / Theses on the topic "Spectrum Access System Privacy"
Makin, Cameron. "Primary User Obfuscation in an Incumbent Informed Spectrum Access System." Thesis, Virginia Tech, 2021. http://hdl.handle.net/10919/104015.
Full textMaster of Science
With a growing demand for spectrum availability, wireless spectrum sharing has become a high-profile solution to spectrum overcrowding. In order to enable spectrum sharing between incumbent/primary (e.g.,federal communications, naval radar, users already grandfathered into the band) and secondary users (e.g., commercial communications companies), incumbents must have spectrum protection and privacy from malicious new entrants. In this Spectrum Access System (SAS) advancement, Primary Users (PUs) are obfuscated with the efforts of the incumbent informed SAS and the cooperation of obedient new entrants. Further, the necessary changes to the SAS to support this privacy scheme are exposed to suggest improvements in PU privacy, Citizens Broadband Radio Service Device (CBSD)-SAS relations, and punishment for unauthorized transmission. Results show the feasibility of PU obfuscation with respect to malicious spectrum sensing users. Simulation results indicate that the obfuscation tactic can deliver location and frequency occupation privacy with 75% and 66% effectiveness respectively in a 100% efficient spectrum utilization oriented obfuscation scheme. A scheme without spectrum utilization constraint shows up to 91% location privacy effectiveness. Experiment trials indicate that the privacy tactic can be implemented on an open-source SAS, however environmental factors may degrade the tactic's performance.
Dou, Yanzhi. "Toward Privacy-Preserving and Secure Dynamic Spectrum Access." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/81882.
Full textPh. D.
Lu, Chang. "Inclusion of Priority Access in a Privacy-preserving ESC-based DSA System." Thesis, Virginia Tech, 2018. http://hdl.handle.net/10919/84872.
Full textMaster of Science
Zabransky, Douglas Milton. "Incorporating Obfuscation Techniques in Privacy Preserving Database-Driven Dynamic Spectrum Access Systems." Thesis, Virginia Tech, 2018. http://hdl.handle.net/10919/85001.
Full textMaster of Science
Lin, Yousi. "Spectrum Management Issues in Centralized and Distributed Dynamic Spectrum Access." Diss., Virginia Tech, 2021. http://hdl.handle.net/10919/104362.
Full textDoctor of Philosophy
Due to the rapid growth in wireless communication demands, the frequency spectrum is becoming increasingly crowded. Traditional spectrum allocation policy gives the unshared access of fixed bands to the licensed users, and there is little unlicensed spectrum left now to allocate to newly emerged communication demands. However, studies on spectrum occupancy show that many licensed users who own the license of certain bands are only active for a small percentage of time, which results in plenty of underutilized spectrum. Hence, a new spectrum sharing paradigm, called dynamic spectrum access (DSA), is proposed to mitigate this problem. DSA enables the spectrum sharing between different classes of users, generally, the unlicensed users in the DSA system can access the licensed spectrum opportunistically without interfering with the licensed users. Based on architecture design, DSA systems can be categorized as centralized and distributed. In centralized systems, a central controller will make decisions on spectrum usage for all unlicensed users. Whereas in distributed systems, unlicensed users can make decisions for themselves independently. To successfully enable DSA, both centralized and distributed DSA systems need to deal with spectrum management issues, such as resource allocation problems and user privacy issues, etc. The resource allocation problems include, for example, the problems to discover and allocate idle bands and the problems to control users' transmit power for successful coexistence. Privacy issues may also arise during the spectrum management process since certain information exchange is inevitable for global decision making. However, due to the Federal Communications Commission's (FCC) regulation, licensed users' privacy such as their location information must be protected in any case. As a result, dynamic and efficient spectrum management techniques are necessary for DSA users. In this dissertation, we investigate the above-mentioned spectrum management issues in both types of DSA systems, specifically, the spectrum sensing challenges with licensed user location privacy issues in centralized DSA, and the spectrum sharing problems in distributed DSA systems. In doing so, we propose novel schemes for solving each related spectrum management problem and demonstrate their efficacy through the results from extensive evaluations and simulations. We believe that this dissertation provides insightful advice for DSA users to solve different spectrum management issues for enabling DSA implementation, and hence helps in a wider adoption of dynamic spectrum sharing.
Bhadriraju, Abhay Rao. "Misuse Detection in Dynamic Spectrum Access Networks." Thesis, Virginia Tech, 2014. http://hdl.handle.net/10919/49259.
Full textMaster of Science
Ullah, Abid. "Mechanisms for Enhancing Spectrum Utilization in a Spectrum Access System." Diss., Virginia Tech, 2017. http://hdl.handle.net/10919/84932.
Full textPh. D.
Ye, Yuxian. "Study of Sensing Issues in Dynamic Spectrum Access." Thesis, Virginia Tech, 2019. http://hdl.handle.net/10919/90184.
Full textMaster of Science
Spectrum relates to the radio frequencies allocated to the federal users and commercial users for communication over the airwaves. It is a sovereign asset that is overseen by the government in each country to manage the radio spectrum and issue spectrum licenses. In addition, spectrum bands are utilized for various purposes because different bands have different characteristics. However, the overly crowded US frequency allocation chart shows the scarcity of usable radio frequencies. The actual spectrum usage measurements reflect that multiple prized spectrum bands lay idle at most time and location, which indicates that the spectrum shortage is caused by the spectrum management policies rather than the physical scarcity of available frequencies. Dynamic spectrum access (DSA) was proposed as a new paradigm of spectrum sharing that allows commercial users to access the abundant white spaces in the licensed spectrum bands to mitigate the spectrum shortage problem and increase spectrum utilization. In DSA, two of the key technical challenges lie in how to dynamically allocate the spectrum and how to protect spectrum users’ security. This thesis focuses on the development of two types of mechanisms for addressing the above two challenges: (1) developing efficient spectrum monitoring schemes to help secondary users (SU) to accurately and dynamically access the white space in spectrum allocation and (2) developing privacy preservation schemes for incumbent users (IU) to protect their location privacy. Specifically, we proposed an unknown IU pattern monitoring scheme that leverages the power of masses of portable mobile devices to reduce the cost of common spectrum monitoring systems. We demonstrate that our system can track not only the existing IU spectrum access patterns but also the unknown patterns where no historical spectrum information exists. We then leverage the solar energy harvesting and design energy management scheme to support our spectrum monitoring system. Finally, we provide a strategy for both static and mobile IUs to hide their true location under the monitoring of Environmental Sensing Capabilities systems.
Bahrak, Behnam. "Ex Ante Approaches for Security, Privacy, and Enforcement in Spectrum Sharing." Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/24720.
Full textPh. D.
Maggenti, Mark A. "Spread spectrum satellite multiple access and overlay service." Thesis, Virginia Tech, 1987. http://hdl.handle.net/10919/45769.
Full textThis thesis presents two applications of spread spectrum technology to very small aperture terminal (VSAT) satellite communication networks. It describes two spread spectrum multiple access systems which use a form of noncoherent M-ary FSK (MFSK) as the primary modulation and analyzes their throughput. The analysis considers such factors as satellite power constraints and adjacent satellite interference. It considers the effect of onâ board processing on the multiple access efficiency and investigates the feasibility of overlaying low data rate spread spectrum signals on existing satellite traffic as a form of frequency reuse.
Master of Science
Books on the topic "Spectrum Access System Privacy"
Nagel, Wil. "Privacy schmrivacy?": Drafting privacy policy in an integrated justice environment (and why it's important) : Illinois Integrated Justice Information System. Chicago, Ill: Illinois Criminal Justice Information Authority, 2004.
Find full textAleksandar, Damnjanovic, and Vojcic Branimir, eds. The cdma2000® system for mobile communications. Upper Saddle River, NJ: Prentice Hall PTR, 2004.
Find full textG, Straus Susan, ed. Patient privacy, consent, and identity management in health information exchange: Issues for the military health system. Santa Monica, CA: RAND, 2013.
Find full textGounaris, Anieli. Spies and snitches: Electronic privacy protection and challenges. Hauppauge, N.Y: Nova Science Publishers, 2011.
Find full textRegulating the credit bureau system in South Korea: Toward new legislative approach to ensuring the accuracy and privacy of consumer credit information. 2005.
Find full textRegulating the credit bureau system in South Korea: Toward new legislative approach to ensuring the accuracy and privacy of consumer credit information. [S.l: s.n., 2005.
Find full textInc, QUALCOMM, and Telecommunications Industry Association. TR45 Committee., eds. Proposed wideband spread spectrum standard: Digital cellular system CDMA-analog dual-mode mobile station-base station compatibility standard. [United States]: QUALCOMM, 1992.
Find full textSvantesson, Dan Jerker B., and Rebecca Azzopardi. Systematic Government Access to Private-Sector Data in Australia. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190685515.003.0010.
Full textTsuchiya, Motohiro. Systematic Government Access to Private-Sector Data in Japan. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190685515.003.0013.
Full textInformation Security Theory and Practices Security and Privacy of Pervasive Systems and Smart Devices Lecture Notes in Computer Science. Springer, 2010.
Find full textBook chapters on the topic "Spectrum Access System Privacy"
Li, He, Yaling Yang, Yanzhi Dou, Chang Lu, Doug Zabransky, and Jung-Min Park. "Comparison of Incumbent User Privacy Preserving Technologies in Database Driven Dynamic Spectrum Access Systems." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 55–65. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-05490-8_6.
Full textArdagna, Claudio Agostino, Sabrina De Capitani di Vimercati, Eros Pedrini, and Pierangela Samarati. "Privacy-Aware Access Control System: Evaluation and Decision." In Digital Privacy, 377–95. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19050-6_14.
Full textCabrera, Annu. "Towards a National Remote Access System for Register-Based Research." In Privacy in Statistical Databases, 181–89. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-45381-1_14.
Full textBerthold, Oliver, Hannes Federrath, and Stefan Köpsell. "Web MIXes: A System for Anonymous and Unobservable Internet Access." In Designing Privacy Enhancing Technologies, 115–29. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-44702-4_7.
Full textSydor, John. "Coral Cognitive WiFi Networking System." In Opportunistic Spectrum Sharing and White Space Access, 123–40. Hoboken, NJ: John Wiley & Sons, Inc, 2015. http://dx.doi.org/10.1002/9781119057246.ch6.
Full textRohling, Hermann, Karsten Brüninghaus, and Rainer Grünheid. "Comparison of Multiple Access Schemes for an OFDM Downlink System." In Multi-Carrier Spread-Spectrum, 23–30. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-1-4615-6231-3_3.
Full textSpalka, Adrian, Armin B. Cremers, and Hartmut Lehmler. "Protecting Confidentiality against Trojan Horse Programs in Discretionary Access Control System." In Information Security and Privacy, 1–17. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/10718964_1.
Full textKolter, Jan, Rolf Schillinger, and Günther Pernul. "A Privacy-Enhanced Attribute-Based Access Control System." In Data and Applications Security XXI, 129–43. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-73538-0_11.
Full textIslam, Muhammad Nazmul, Narayan B. Mandayam, Ivan Seskar, and Sastry Kompella. "System Power Minimization in Non-contiguous Spectrum Access." In Handbook of Cognitive Radio, 1–30. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-1389-8_24-1.
Full textIslam, Muhammad Nazmul, Narayan B. Mandayam, Ivan Seskar, and Sastry Kompella. "System Power Minimization in Non-contiguous Spectrum Access." In Handbook of Cognitive Radio, 839–68. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-10-1394-2_24.
Full textConference papers on the topic "Spectrum Access System Privacy"
Dou, Yanzhi, He Li, Kexiong Curtis Zeng, Jinshan Liu, Yaling Yang, Bo Gao, and Kui Ren. "Preserving Incumbent Users’ Privacy in Exclusion-Zone-Based Spectrum Access Systems." In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2017. http://dx.doi.org/10.1109/icdcs.2017.322.
Full textDou, Yanzhi, He Li, Kexiong Zeng, Jinshan Liu, Yaling Yang, Bo Gao, and Kui Ren. "Preserving Incumbent Users' Privacy in Server-Driven Dynamic Spectrum Access Systems." In 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2016. http://dx.doi.org/10.1109/icdcs.2016.40.
Full textDou, Yanzhi, Kexiong (Curtis) Zeng, Yaling Yang, and Kui Ren. "Preserving incumbent users' privacy in exclusion-zone-based spectrum access systems." In MobiCom'16: The 22nd Annual International Conference on Mobile Computing and Networking. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2973750.2985283.
Full textGuan, Chaowen, Aziz Mohaisen, Zhi Sun, Lu Su, Kui Ren, and Yaling Yang. "When Smart TV Meets CRN: Privacy-Preserving Fine-Grained Spectrum Access." In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2017. http://dx.doi.org/10.1109/icdcs.2017.75.
Full textTroja, Erald, and Spiridon Bakiras. "Leveraging P2P interactions for efficient location privacy in database-driven dynamic spectrum access." In SIGSPATIAL '14: 22nd SIGSPATIAL International Conference on Advances in Geographic Information Systems. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2666310.2666477.
Full textTroja, Erald, and Joshua Gitter. "Privacy-preserving Crowd-sensing for Dynamic Spectrum Access." In MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM). IEEE, 2019. http://dx.doi.org/10.1109/milcom47813.2019.9020713.
Full textBahrak, Behnam, Sudeep Bhattarai, Abid Ullah, Jung-Min Jerry Park, Jeffery Reed, and David Gurney. "Protecting the primary users' operational privacy in spectrum sharing." In 2014 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN). IEEE, 2014. http://dx.doi.org/10.1109/dyspan.2014.6817800.
Full textTroja, Erald, and Ice Lin. "Fraud-resilient Privacy-preserving Crowd-sensing for Dynamic Spectrum Access." In 2021 IEEE 93rd Vehicular Technology Conference (VTC2021-Spring). IEEE, 2021. http://dx.doi.org/10.1109/vtc2021-spring51267.2021.9448648.
Full textAnjum, Md Monowar, and Noman Mohammed. "PAARS: Privacy Aware Access Regulation System." In 2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON). IEEE, 2020. http://dx.doi.org/10.1109/uemcon51285.2020.9298048.
Full textRajkarnikar, Nirajan, Jon M. Peha, and Ana Aguiar. "Location privacy from dummy devices in database-coordinated spectrum sharing." In 2017 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN). IEEE, 2017. http://dx.doi.org/10.1109/dyspan.2017.7920796.
Full text