L Hu,
H Wen, B Wu,
J Tang, F Pan… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
This paper investigates cooperative security in wireless networks, where a source (Alice)
intends to transmit a confidential message to a legitimate destination (Bob), with the help of …