Search
Now showing items 1-5 of 5
Resource allocation for maximizing secrecy rate in presence of active eavesdropper
Publisher: IEEE
Year: 2014
Resource allocation based on the message passing algorithm in underlay cognitive networks
Publisher: IEEE
Year: 2014