Authentication scheme to combat a primary user emulation attack against cognitive radio users

  • Various methods to combat PUEA
  • Jayapalan Avila, Karrupasamy Thenmozhi
  • Security and Communication Networks, October 2015, Wiley
  • DOI: 10.1002/sec.1339

The authors haven't yet claimed this publication.

Read Publication

http://dx.doi.org/10.1002/sec.1339

In partnership with: