尾巴 发表于 2025-3-23 10:52:06

http://reply.papertrans.cn/87/8637/863661/863661_11.png

Offensive 发表于 2025-3-23 17:20:13

http://reply.papertrans.cn/87/8637/863661/863661_12.png

CORE 发表于 2025-3-23 18:38:24

Secure Data Transmission Protocol,ctly between the proximity devices, they may subject to variety security threats such as data modification and fabrication, privacy violation. This chapter proposes a secure data sharing protocol through a cryptography approach. Specifically, digital signature combing with mutual authentication betw

dagger 发表于 2025-3-23 23:59:29

,Joint Physical–Application Layer Security,n this chapter, we focus on the security for wireless multimedia transmission over D2D communications. The existing security methods consider physical-layer and application-layer security technologies independently while both of them have significant impact on security performance. Thus, we propose

Scintigraphy 发表于 2025-3-24 03:42:59

http://reply.papertrans.cn/87/8637/863661/863661_15.png

anchor 发表于 2025-3-24 10:11:51

http://reply.papertrans.cn/87/8637/863661/863661_16.png

Aviary 发表于 2025-3-24 14:42:54

Introduction,e security architectures, threat model, and security requirements of D2D communications are presented. Finally, the organization of the book is depicted for a comprehensive understanding for all the content.

Cardioversion 发表于 2025-3-24 18:52:34

http://reply.papertrans.cn/87/8637/863661/863661_18.png

GREEN 发表于 2025-3-24 19:53:29

http://reply.papertrans.cn/87/8637/863661/863661_19.png

antidepressant 发表于 2025-3-25 00:44:23

e in the area of commodities, but in response to the issues raised by Dr.Gazis last evening about the validation of models I think I will move to a slightly different aspect of our work, one which should permit a good deal of conversation about the role of modelling and the limitations imposed on th
页: 1 [2] 3 4
查看完整版本: Titlebook: Security-Aware Device-to-Device Communications Underlaying Cellular Networks; Aiqing Zhang,Liang Zhou,Lei Wang Book 2016 The Author(s) 201