JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2018, Vol. 53 ›› Issue (11): 51-55.doi: 10.6040/j.issn.1671-9352.0.2018.430
• • Previous Articles Next Articles
Zhao-xia WU1(),Jia-qi WANG2,*()
CLC Number:
1 | VALENTA V, MARŠÁLEK R, BAUDOIN G, et al. Survey on spectrum utilization in Europe: measurements, analyses and observations[C]//Cognitive Radio Oriented Wireless Networks & Communications (CROWNCOM), 2010 Proceedings of the Fifth International Conference on. New York: IEEE, 2010: 1-5. |
2 | CRAMTON P . Spectrum auction design[J]. Review of Industrial Organization, 2013, 42 (2): 161- 190. |
3 | WANG Xiaoyan, JI Yusheng, ZHOU Hao, et al. A privacy preserving truthful spectrum auction scheme using homomorphic encryption[C]//Global Communications Conference (GLOBECOM), 2015 IEEE. New York: IEEE, 2015: 1-6. |
4 | ZHOU Minping, NIU Chaoyue, ZHENG Zhenzhe, et al. An efficient, privacy-preserving, and verifiable online auction mechanism for Ad exchanges[C]//Global Communications Conference (GLOBECOM), 2015 IEEE. New York: IEEE, 2015: 1-6. |
5 |
WANG Qinhui , YE Baoliu , XU Tianyin , et al. Approximately truthful mechanisms for radio spectrum allocation[J]. IEEE Transactions on Vehicular Technology, 2015, 64 (6): 2615- 2626.
doi: 10.1109/TVT.2014.2345418 |
6 | ZHU Ruihao, LI Zhijing, WU Fan, et al. Differentially private spectrum auction with approximate revenue maximization[C]//Proceedings of the 15th ACM international symposium on mobile ad hoc networking and computing. New York: ACM, 2014: 185-194. |
7 | CHEN Zhili, HUANG Liusheng, LI Lu, et al. PS-TRUST: provably secure solution for truthful double spectrum auctions[C]//INFOCOM, 2014 Proceedings IEEE. New York: IEEE, 2014: 1249-1257. |
8 | LI Ming, LI Pan, GUO Linke, et al. PPER: privacy-preserving economic-robust spectrum auction in wireless networks[C]//Computer Communications (INFOCOM), 2015 IEEE Conference on. New York: IEEE, 2015: 909-917. |
9 |
HUANG He , LI Xiangyang , SUN Yue , et al. PPS: privacy-preserving strategyproof social-efficient spectrum auction mechanisms[J]. IEEE Transactions on Parallel and Distributed Systems, 2015, 26 (5): 1393- 1404.
doi: 10.1109/TPDS.2014.2315200 |
[1] | CUI Zhao-yang, SUN Jia-qi, XU Song-yan, JIANG Xin. A secure clustering algorithm of Ad Hoc network for colony UAVs [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 51-59. |
[2] | LIU Li-zhao, YU Jia-ping, LIU Jian, LI Jun-yi, HAN Shao-bing, XU Hua-rong, LIN Huai-chuan, ZHU Shun-zhi. Secure storage addressing algorithm for large data based on quantum radiation field [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 65-74. |
[3] | RUAN Shu-hua, WENG Jun-hao, MAO Hui, CHEN Xue-lian. Metric model for cloud computing security risk assessment [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(3): 71-76. |
[4] | MENG Bo, LU Jin-tian, WANG De-jun, HE Xu-dong. Survey of security analysis of security protocol implementations [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 1-18. |
[5] | TAN Ren, YIN Xiao-chuan, JIAO Xian-long, LIAN Zhe, CHEN Yu-xin. Software defined APT attack moving target defense network architecture [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 38-45. |
[6] | ZHU Dan, XIE Xiao-yao, XU Yang, XIA Meng-ting. Evaluation method for network security level based on cloud model and Bayesian feedback [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 53-62. |
[7] | LI Yang, CHENG Xiong, TONG Yan, CHEN Wei, QIN Tao, ZHANG Jian, XU Ming-di. Method for threaten users mining based on traffic statistic characteristics [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 83-88. |
[8] | DING Yi-tao, YANG Hai-bin, YANG Xiao-yuan, ZHOU Tan-ping. A reversible image data hiding scheme in Homomorphic encrypted domain [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(7): 104-110. |
[9] | YANG Shu-mian, WANG Lian-hai, ZHANG Shu-hui, XU Shu-jiang, LIU Guang-qi. A real-time monitoring and forensics method under the IaaS model [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(6): 84-91. |
[10] | WU Di, WANG Li-na, YU Rong-wei, ZHANG Xin, XU Lai. Multidimensional data visualization in cloud platform security monitoring [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(6): 56-63. |
[11] | KANG Hai-yan, MA Yue-lei. Survey on application of data mining via differential privacy [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 16-23. |
[12] | ZHU Zhi-qiang, MA Ke-xin, SUN Lei. A zero-knowledge proof based remote desktop authentication protocol [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 47-52. |
[13] | SU Bin-ting, XU Li, FANG He, WANG Feng. Fast authentication mechanism based on Diffie-Hellman for wireless mesh networks [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 101-105. |
[14] | TANG Qian, YANG Fei, HUANG Qi, LIN Guo-yuan. Security transfer model of access control information based on TCB subsets [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(7): 98-106. |
[15] | WU Huan, ZHAN Jing, ZHAO Yong, TAO Zheng, YANG Jing. An efficient multilevel interconnection network security mechanism based on virtualization [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(3): 98-103. |
|