In this paper, we study the stability region of the two-user broadcast channel (BC) with bursty data arrivals and security constraints. It is assumed that one of the receivers has a secrecy …
P Boonyakarn, P Komolkiti… - 2011 Eighth International …, 2011 - ieeexplore.ieee.org
This paper is concerned with the framework for finding the optimal stochastic routing to defend intelligent eavesdropping attacks in the Wireless Mesh Network (WMN) with a cone …
Z Li, J Gu, Q Liu - ICT 2013, 2013 - ieeexplore.ieee.org
In this paper an interference alignment (IA) based dynamic spectrum sharing and user scheduling scheme for cognitive radio (CR) multi-input multi-output (MIMO) uplink system …
Multi-hop Wireless Networks (MWNs) represent a class of networks where messages are forwarded through multiple hops of wireless transmission. Applications of this newly …
Kablosuz algılayıcı ağlar (KAA) belirli bir coğrafi alana dağılmış küçük algılayıcı düğümlerden ve baz istasyonundan oluşmaktadır. Hedeflenen düğüm çiftleri dışında diğer …
YWP Hong, PC Lan, CCJ Kuo, YWP Hong… - … Approaches to Secure …, 2014 - Springer
This chapter provides a brief survey of recent developments and applications of physical- layer secrecy techniques in modern wireless systems, such as cognitive radios, orthogonal …