Computer Science ›› 2019, Vol. 46 ›› Issue (10): 167-172.doi: 10.11896/jsjkx.180901776
• Information Security • Previous Articles Next Articles
ZHANG Can, SHI Xin, WANG Meng
CLC Number:
[1]LIN P,SONG Q,YU Y,et al.Extensive Cooperative Caching in D2D Integrated Cellular Networks[J].IEEE Communications Letters,2017,21(9):2101-2104. [2]WU D,ZHOU L,CAI Y,et al.Physical-Social-Aware D2D Con-tent Sharing Networks:A Provider-Demander Matching Game[J].IEEE Transactions on Vehicular Technology,2018,67(8):7538-7549. [3]YUAN X L,WANG X Y,WANG J F,et al.Enabling Secure and Efficient Video Delivery Through Encrypted in-Network Caching[J].IEEE Journal on Selected Areas in Communications,2016,34(8):1-1 [4]SENGUPTA A,TANDON R,CLANCYl T.Fundamental Li-mits of Caching with Secure Delivery[C]//IEEE International Conference on Communications Workshops.IEEE,2013. [5]AWAN Z H,SEZGIN A.Fundamental Limits of Caching in D2D Networks With Secure Delivery[C]//Proceedings of IEEE International Conference on Communication Workshop.London:IEEE Press,2015:464-469. [6]ZEWAIL A A,YENER A.Fundamental Limits of Secure Device-to-Device Coded Caching[C]//Proceedings of 50th Asilomar Conference on Signals,Systems and Computers.Pacific Grove:IEEE Press,2016:1414-1418 [7]ZEWAIL A A,YENER A.Coded Caching for Resolvable Networks with Security Requirements[C]//Proceedings of IEEE Conference on Communications and Network Security.Philadelphia:IEEE Press,2016:621-625 [8]RAVINDRAKUMAR V,PANDA P,KARAMCHANDANI N,et al.Private Coded Caching[J].IEEE Transactions on Information Forensics and Security,2018,13(3):685-694. [9]SU Z,XU Q C.Security-Aware Resource Allocation for Mobile Social Big Data:A Matching-Coalitional Game Solution[J].IEEE Transactions on Big Data,2017:PP(5):1-1. [10]WYNER A D.The Wire-Tap Channe[J].Bell System Technical Journal,1975,54(8):1355-1387. [11]CHEN Y J,JI X S,HUANG K Z,et al.Secrecy Outage Probability Based Access Strategy for Device-to-Device Communication Underlaying Cellular Networks[J].Chinese Journal on Communications,2016,37(8):86-94.(in Chinese) 陈亚军,季新生,黄开枝,等.基于安全中断概率的D2D安全接入策略[J].通信学报,2016,37(8):86-94. [12]LUO Y,CUI L,YANG Y.Research on Physical Layer Security in D2D Enabled Cellular Networks with an Active Eavesdropper[J].Chinese Journal of Signal Processing,2018,34(1):119-125.(in Chinese) 罗屹洁,崔丽,杨旸.D2D使能蜂窝网络中存在主动窃听者的物理层安全研究[J].信号处理,2018,34(1):119-125. [13]WANG L,WU H,LIU L,et al.Secrecy-Oriented Partner Selection Based on Social Trust in Device-to-Device Communications[C]//Proceedings of IEEE International Conference on Communications.London:IEEE Press,2015:7275-7279. [14]QU J,CAI Y,WU D,et al.Stackelberg Game Based Power Allocation for Physical Layer Security of Device-to-Device Communication underlaying Cellular Networks[J].Frequenz,2014,68(5/6):285-295. [15]GABRY F,BIOGLIO V,LAND I.On Edge Caching with Secrecy Constraints[C]//Proceedings of IEEE International Confe-rence on Communications.New Jersey:IEEE Press,2016:1-6. [16]WANG L,WU H.Jamming Partner Selection for Maximizing the Worst D2D Secrecy Rate Based on Social Trust[J].IEEE Transactions on Emerging Telecommunications Technologies,2017,28(2):1-11. [17]ZHANG G,YANG K,CHEN H H.Socially Aware Cluster Formation and Radio Resource Allocation in D2D Networks[J].IEEE Wireless Communications,2016,23(4):68-73. [18]ZHAO P,FENG L,YU P,et al.A Social-Aware Resource Allocation for 5G Device-to-Device Multicast Communication[J].IEEE Access,2017,5:15717-15730. [19]FENG L,ZHAO P,ZHOU F,et al.Resource Allocation for 5G D2D Multicast Content Sharing in Social-Aware Cellular Networks[J].IEEE Communications Magazine,2018,56(3):112-118. [20]JI M,CAIRE G,MOLISCH A.Wireless Device-to-Device Caching Networks:Basic Principles and System Performance[J].IEEE Journal on Selected Areas in Communications,2016,34(1):176-189. |
[1] | XU Guang-xian, CUI Jun-jie. Anti-eavesdropping Network Coding Based on Quantum GHZ State [J]. Computer Science, 2020, 47(7): 314-321. |
[2] | ZHAO Jia-jia and REN Ping-an. Random Network Coding Based on Anti-eavesdropping and Byzantine Adversaries [J]. Computer Science, 2014, 41(9): 174-177. |
[3] | XING Xing,ZHANG Wei-shi and JIA Zhi-chun. TBLFM:Trust Based Latent Factor Model for Social Recommendation [J]. Computer Science, 2014, 41(1): 163-167. |
|