Results 221 to 230 of about 7,230 (237)
Some of the next articles are maybe not open access.
Applied Optics
In this paper, we investigate the physical layer security of a vertical relay-assisted underwater wireless optical communication system with simultaneous lightwave information and power transfer and artificial noise to enhance both security and energy sustainability.
Gan, Li +3 more
openaire +2 more sources
In this paper, we investigate the physical layer security of a vertical relay-assisted underwater wireless optical communication system with simultaneous lightwave information and power transfer and artificial noise to enhance both security and energy sustainability.
Gan, Li +3 more
openaire +2 more sources
Anais do XL Simpósio Brasileiro de Telecomunicações e Processamento de Sinais, 2022
Álvaro G. S. Correia +2 more
openaire +1 more source
Álvaro G. S. Correia +2 more
openaire +1 more source
Effective Secrecy Throughput Maximization for WPT Enabled IoT in the FBL Regime
2024 10th International Conference on Computer and Communications (ICCC)Ning Guo +5 more
openaire +1 more source
Maximum Secrecy Throughput of Transmit Antenna Selection with Eavesdropper Outage Constraints
IEEE Signal Processing Letters, 2015Marcos Eduardo Pivaro Monteiro +2 more
exaly
Maximum Secrecy Throughput of MIMOME FSO Communications With Outage Constraints
IEEE Transactions on Wireless Communications, 2018Marcos Eduardo Pivaro Monteiro +2 more
exaly
Secrecy Throughput Maximization for MISO Multi-Eavesdropper Wiretap Channels
IEEE Transactions on Information Forensics and Security, 2017Wei Wang, Kah Chan Teh, Kwok Hung Li
exaly
On the Security–Reliability and Secrecy Throughput of Random Mobile User in Internet of Things
IEEE Internet of Things Journal, 2020Jie Tang, Hong Wen, Huanhuan Song
exaly
Outage Constrained Secrecy Throughput Maximization for DF Relay Networks
IEEE Transactions on Communications, 2015Tong-Xing Zheng +2 more
exaly
On the Secrecy Throughput Maximization for MISO Cognitive Radio Network in Slow Fading Channels
IEEE Transactions on Information Forensics and Security, 2014Chao Wang, Hui-Ming Wang
exaly

