000755820 000__ 03434cam\a2200469Ii\4500 000755820 001__ 755820 000755820 005__ 20230306141815.0 000755820 006__ m\\\\\o\\d\\\\\\\\ 000755820 007__ cr\cn\nnnunnun 000755820 008__ 160613s2016\\\\sz\a\\\\ob\\\\000\0\eng\d 000755820 019__ $$a951977701 000755820 020__ $$a9783319324586$$q(electronic book) 000755820 020__ $$a3319324586$$q(electronic book) 000755820 020__ $$z9783319324579 000755820 035__ $$aSP(OCoLC)ocn951623670 000755820 035__ $$aSP(OCoLC)951623670$$z(OCoLC)951977701 000755820 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dYDXCP$$dIDEBK$$dGW5XE$$dN$T$$dAZU$$dEBLCP$$dCOO 000755820 049__ $$aISEA 000755820 050_4 $$aTK5102.85 000755820 08204 $$a621.3845$$223 000755820 1001_ $$aZhang, Aiqing,$$eauthor. 000755820 24510 $$aSecurity-aware device-to-device communications underlaying cellular networks$$h[electronic resource] /$$cAiqing Zhang, Liang Zhou, Lei Wang. 000755820 264_1 $$aSwitzerland :$$bSpringer,$$c2016. 000755820 300__ $$a1 online resource (x, 73 pages) :$$billustrations. 000755820 336__ $$atext$$btxt$$2rdacontent 000755820 337__ $$acomputer$$bc$$2rdamedia 000755820 338__ $$aonline resource$$bcr$$2rdacarrier 000755820 4901_ $$aSpringerBriefs in electrical and computer engineering,$$x2191-8112 000755820 504__ $$aIncludes bibliographical references. 000755820 5050_ $$aIntroduction -- Secure Data Transmission Protocol -- Joint Physical-application Layer Security -- Cooperation Stimulation -- Summary. . 000755820 506__ $$aAccess limited to authorized users. 000755820 520__ $$aThe objective of this SpringerBrief is to present security architectures and incentive mechanisms to realize system availability for D2D communications. D2D communications enable devices to communicate directly, improving resource utilization, enhancing user's throughput, extending battery lifetime, etc. However, due to the open nature of D2D communications, there are two substantial technical challenges when applied to large-scale applications, that is, security and availability which is demonstrated in this book. This SpringerBrief proposes a secure data sharing protocol, which merges the advantages of public key cryptography and symmetric encryption, to achieve data security in D2D communications. Furthermore, a joint framework involving both the physical and application layer security technologies is proposed for multimedia service over D2D communications thus the scalable security service can be achieved without changing the current communication framework. Additionally, as the system availability largely depends on the cooperation degree of the users, a graph-theory based cooperative content dissemination scheme is proposed to achieve maximal Quality of Experience (QoE) with fairness and efficiency. This SpringerBrief will be a valuable resource for advanced-level students and researchers who want to learn more about cellular networks. 000755820 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed June 20, 2016). 000755820 650_0 $$aMobile communication systems$$xSecurity measures. 000755820 7001_ $$aZhou, Liang,$$eauthor. 000755820 7001_ $$aWang, Lei,$$eauthor. 000755820 77608 $$iPrint version:$$aZhang, Aiqing$$tSecurity-Aware Device-to-Device Communications Underlaying Cellular Networks$$dCham : Springer International Publishing,c2016$$z9783319324579 000755820 830_0 $$aSpringerBriefs in electrical and computer engineering. 000755820 852__ $$bebk 000755820 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-32458-6$$zOnline Access$$91397441.1 000755820 909CO $$ooai:library.usi.edu:755820$$pGLOBAL_SET 000755820 980__ $$aEBOOK 000755820 980__ $$aBIB 000755820 982__ $$aEbook 000755820 983__ $$aOnline 000755820 994__ $$a92$$bISE