Author of the publication

A credit-token-based spectrum etiquette framework for coexistence of heterogeneous cognitive radio networks.

, , and . INFOCOM, page 2715-2723. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Park, Jung-Min "Jerry"
add a person with the name Park, Jung-Min "Jerry"
 

Other publications of authors with the same name

Robustness against Byzantine Failures in Distributed Spectrum Sensing., , and . Computer Communications, 35 (17): 2115-2124 (2012)Security of Cognitive Radios., and . Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Maximizing Rendezvous Diversity in Rendezvous Protocols for Decentralized Cognitive Radio Networks., and . IEEE Trans. Mob. Comput., 12 (7): 1294-1307 (2013)Incentivizing spectrum sensing in database-driven dynamic spectrum sharing., , , , , , and . INFOCOM, page 1-9. IEEE, (2016)PSUN: An OFDM scheme for coexistence with pulsed radar., , and . ICNC, page 984-988. IEEE Computer Society, (2015)Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions., , , , , , , and . IEEE Trans. Mob. Comput., 16 (2): 552-565 (2017)Provably Secure Anonymous-yet-Accountable Crowdsensing with Scalable Sublinear Revocation., , , , and . PoPETs, 2017 (4): 384-403 (2017)SecureMatch: Scalable Authentication and Key Relegation for IoT Using Physical-Layer Techniques., , and . CNS, page 1-9. IEEE, (2018)Group Signatures with Probabilistic Revocation: A Computationally-Scalable Approach for Providing Privacy-Preserving Authentication., , , , and . ACM Conference on Computer and Communications Security, page 1334-1345. ACM, (2015)Comparison of Incumbent User Privacy Preserving Technologies in Database Driven Dynamic Spectrum Access Systems., , , , , and . CrownCom, volume 261 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 55-65. Springer, (2018)