Abstract—Cognitive radio (CR) technology enables the opportunistic use of the vacant licensed frequency bands, thereby improving the spectrum utilization. However, the CR operati...
In this paper we introduce an architecture for a multi-key pirate decoder which employs decryption keys from multiple traitors. The decoder has built-in monitoring and self protect...
A weighted sum-rate maximization problem is considered for an access point (AP) allocating resources to wireless cognitive radios (CRs) communicating using orthogonal frequency-di...
Seung-Jun Kim, Nasim Yahya Soltani, Georgios B. Gi...
While by now feasible solutions to protect privacy for complex ubiquitous applications are available, very small devices, called context transponders (CTP) still lack resources to...
The emergence of online digital media sales services has given rise to the issue of online digital rights management (DRM). This paper presents a novel approach to online digital ...