… of security features with the existing relevant schemes is also … of our proposed scheme (IBAKAS), then the security analysis … in Sections 5 Security analysis of the proposed scheme, 6 …
L Yao, Y Liu - … Engineering and Intelligent Communications …, 2020 - ieeexplore.ieee.org
… In this article, we investigate the selection of beamforming method in MU-MISO … the security transmitting performance of different beamforming methods by a novel analysis scheme. We …
L Sun, P Ren, Q Du - EURASIP Journal on Wireless Communications and …, 2014 - Springer
… The proposed selectionscheme can be realized in a fully distributed manner, and the security … Traditional approaches to securingcommunications rely heavily on the data encryption at …
H Hu, R Lu, C Huang, Z Zhang - Peer-to-Peer Networking and Applications, 2017 - Springer
… It allows us to design a secure and efficient relay selectionscheme. Second, we build a trust-based relay selectionscheme through which a requesting vehicle is able to quickly decide …
M Yanase, T Ohtsuki - Procedia-Social and Behavioral Sciences, 2010 - Elsevier
… However, these user selectionschemes do not take security into consideration. One … the proposed scheme is an effective user selectionscheme to guarantee secrecy of communication. …
L Zhou, F Tan, X Li, L Zhou - Neurocomputing, 2021 - Elsevier
… dynamics, as well as its appliance in securecommunications have not been informed yet. … to study the fixed-time synchronization-based securecommunication issue for two-layer hybrid …
RG Li, HN Wu - IEEE Transactions on Circuits and Systems I …, 2020 - ieeexplore.ieee.org
… Meanwhile, an execution scheme for the iterative approach is … Simultaneously, secure communication depending on this … and encryption-decryption scheme. Simulation results verify the …
… , are performed to evaluate the security of the proposed … security analysis of the proposed encryption scheme and the existing work to demonstrate that the suggested encryption scheme …
Z Luo, H Wang, K Zhou - IEEE Access, 2017 - ieeexplore.ieee.org
… scheme to enhance the physical layer security (PF-PHY) in dual-polarized satellite communications… polarization states are selected based on the designed selection rule to carry the …