{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T15:23:21Z","timestamp":1730215401708,"version":"3.28.0"},"reference-count":49,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1109\/dyspan.2019.8935740","type":"proceedings-article","created":{"date-parts":[[2019,12,20]],"date-time":"2019-12-20T00:56:41Z","timestamp":1576803401000},"page":"1-10","source":"Crossref","is-referenced-by-count":3,"title":["PriRoster: Privacy-preserving Radio Context Attestation in Cognitive Radio Networks"],"prefix":"10.1109","author":[{"given":"Ruide","family":"Zhang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ning","family":"Wang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ning","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zheng","family":"Yan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wenjing","family":"Lou","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Y.","family":"Thomas Hou","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813717"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2823314"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414484"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69170-9_25"},{"key":"ref31","first-page":"272","article-title":"Swatt: Software-based attestation for embedded devices","author":"seshadri","year":"2004","journal-title":"null"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046711"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978335"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813670"},{"journal-title":"Aid Autonomous attestation of iot devices","year":"2018","author":"ibrahim","key":"ref35"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1145\/2939918.2939938","article-title":"Darpa: Device attestation resilient to physical attacks","author":"ibrahim","year":"2016","journal-title":"The Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.13"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998432"},{"key":"ref29","first-page":"295","article-title":"Establishing the genuinity of remote computer systems","author":"kennell","year":"2003","journal-title":"Usenix Security Symp"},{"journal-title":"Optimising leds for wireless communication","year":"0","key":"ref2"},{"journal-title":"From radiotelegraphy to worldwide wireless How itu processes and regulations have helped shape the modern world of radiocommunications","year":"0","key":"ref1"},{"key":"ref20","first-page":"431","article-title":"Raccoon: Closing digital side-channels through obfuscated execution","author":"rane","year":"2015","journal-title":"Usenix Security Symp"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1275571.1275600"},{"journal-title":"Opte","year":"0","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2593192"},{"key":"ref23","first-page":"1","article-title":"Smart: Secure and minimal architecture for (establishing dynamic) root of trust","volume":"12","author":"eldefrawy","year":"2012","journal-title":"NDSS"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-5699-1_90"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.45"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/DySPAN.2014.6817800"},{"key":"ref11","first-page":"1","article-title":"Intel sgx explained","volume":"2016","author":"costan","year":"2016","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660318"},{"key":"ref12","first-page":"33","article-title":"Software grand exposure: Sgx cache attacks are practical","author":"brasser","year":"2017","journal-title":"arXiv preprint arXiv 1702 03180"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.45"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8485838"},{"journal-title":"Field trial of the 3 5 ghz citizens broadband radio service governed by a spectrum access system (sas)","year":"2017","author":"palola","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7158261"},{"key":"ref17","article-title":"Security technology building a secure system using trustzone technology (white paper)","author":"arm","year":"2009","journal-title":"ARM Limited"},{"key":"ref18","article-title":"Integrating remote attestation with transport layer security","author":"knauth","year":"2018","journal-title":"arXiv preprint arXiv 1801 08639"},{"key":"ref19","first-page":"619","article-title":"Oblivious multi-party machine learning on trusted processors","author":"ohrimenko","year":"2016","journal-title":"Usenix Security Symp"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7158261"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4481338"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2018.8433187"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-011-0124-7"},{"journal-title":"He strava heat map and the end of secrets","year":"0","key":"ref8"},{"key":"ref7","article-title":"Camouflaging mobile primary users in database-driven cognitive radio networks","author":"he","year":"2018","journal-title":"IEEE Wireless Commun Letters"},{"key":"ref49","first-page":"16","article-title":"Inferring fine-grained control flow inside sgx enclaves with branch shadowing","author":"lee","year":"2017","journal-title":"26th USENIX Security Symposium"},{"journal-title":"Adversarial and Uncertain Reasoning for Adaptive Cyber Defense Building the Scientific Foundation","year":"2015","author":"jajodia","key":"ref9"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516660"},{"key":"ref45","article-title":"Zerotrace: Oblivious memory primitives from intel sgx","author":"sasy","year":"2017","journal-title":"NDSS"},{"key":"ref48","first-page":"980","article-title":"Truspy: Cache side-channel information leakage from the secure world on arm devices","volume":"2016","author":"zhang","year":"2016","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053007"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218432"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.24"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23193"},{"key":"ref43","first-page":"448","article-title":"An architecture for secure software defined radio","author":"li","year":"2009","journal-title":"Conference on Design Automation and Test in Europe"}],"event":{"name":"2019 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN)","start":{"date-parts":[[2019,11,11]]},"location":"Newark, NJ, USA","end":{"date-parts":[[2019,11,14]]}},"container-title":["2019 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8932652\/8935636\/08935740.pdf?arnumber=8935740","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T20:18:30Z","timestamp":1658261910000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8935740\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/dyspan.2019.8935740","relation":{},"subject":[],"published":{"date-parts":[[2019,11]]}}}