Author:
Jayapalan Avila,Praveenkumar Padmapriya,Savarinathan Prem,Karuppasamy Thenmozhi
Publisher
Springer International Publishing
Reference22 articles.
1. Khasawneh, M., Agarwal, A.: A secure and efficient authentication mechanism applied to cognitive radio networks. IEEE Access 5, 15597–15608 (2017)
2. Truong, T., Nguyen, M., Kundu, C., Nguyen, L.D.: Secure cognitive radio networks with source selection and unreliable backhaul connections, IET Commun. 1215, 1771–1777 (2018)
3. Jayapalan, A., Savarinathan, P., Praveenkumar, P., Karuppasamy, T.: Detecting and mitigating selfish primary users in cognitive radio. Wirel. Pers. Commun. 109, 1021–1031( 2019)
4. Zhang, T., Abd El-Latif, A.A., Han, Q., Niu, X.: Selective encryption for cartoon images. In: 2013 5th International Conference on Intelligent Human-Machine Systems and Cybernetics, vol. 2, pp. 198–201. IEEE (2013)
5. Li, L., El-Latif, A.A.A., Han, Q., Niu, X.: An improved additively homomorphic image encryption scheme based on elliptic curve Elgamal. Int. J. Adv. Comput. Technol. 4(7), 223–230 (2012)