Digital Signature / Cryptography / Cognitive radio / Key Management / Radio Frequency / Resource Management / Public key cryptography / Spectrum / Digital Signatures / Boolean Satisfiability / Denial of Service Attack / Resource Management / Public key cryptography / Spectrum / Digital Signatures / Boolean Satisfiability / Denial of Service Attack