Results 241 to 250 of about 139,334 (281)
Unique Information Through the Lens of Channel Ordering: An Introduction and Review. [PDF]
Banerjee PK.
europepmc +1 more source
Security Performance Analysis of Downlink Double Intelligent Reflecting Surface Non-Orthogonal Multiple Access Network for Edge Users. [PDF]
Anh NT, Viet NH, Do DT, Silva A.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Robust Outage Secrecy Rate Optimizations for a MIMO Secrecy Channel
IEEE Wireless Communications Letters, 2015This letter investigates robust secrecy rate optimization techniques for a multiple-input-multiple-output (MIMO) wiretap channel in the presence of a multiantenna eavesdropper. In particular, two robust secrecy rate optimization problems are studied: robust power minimization with an outage secrecy rate constraint and robust secrecy rate maximization ...
Chu, Zheng +4 more
openaire +4 more sources
Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer
IEEE Transactions on Vehicular Technology, 2015In this paper, we study different secrecy rate optimization techniques for a multiple-input–multiple-output (MIMO) secrecy channel, where a multiantenna cooperative jammer is employed to improve secret communication in the presence of a multiantenna eavesdropper.
Chu Z +4 more
openaire +4 more sources
Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Multiple-Antenna Eavesdropper
IEEE Transactions on Vehicular Technology, 2014This paper studies different secrecy rate optimization problems for a multiple-input–multiple-output (MIMO) secrecy channel. In particular, we consider a scenario where a communication through a MIMO channel is overheard by a multiple-antenna eavesdropper.
Cumanan K +4 more
openaire +4 more sources
Maximum secrecy rate in inhomogeneous poisson networks
2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2017The impressive growth of secrecy-sensitive wireless applications calls for methods to complement traditional cryptography. In particular, physical-layer security is attractive to enhance communication confidentiality by exploiting the characteristics of the wireless environment.
Chisci, Giovanni +3 more
openaire +3 more sources
Secrecy Rate Analysis for the Cooperative Communications
2023 12th International Conference on Awareness Science and Technology (iCAST), 2023Due to the character of low cost and easily to implemented, the cooperative communication is the future tendency. Three fundamental mode, Amplify-and-Forward (AF) mode, Decode-and-Forward (DF) mode and Compress and Forward (CF) mode are employed to the system.
Chen, Jong Shin +3 more
openaire +2 more sources
MIMO multi-user secrecy rate analysis
2014 IEEE International Conference on Communications (ICC), 2014In this paper, we consider the broadcast channel with confidential messages and eavesdroppers (BCCE), where a multi-antenna base station simultaneously communicates to multiple potentially malicious users, in the presence of external eavesdroppers randomly located according to a Poisson point process (PPP).
Giovanni Geraci +4 more
openaire +1 more source

