Skip navigation

Browsing by Subject physical layer security

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 1 to 12 of 12
Issue DateTitleAuthor(s)
2023Destination Scheduling for Secure Pinhole-Based Power-Line CommunicationKundu C.; Dubey A.; Tonello A.M.; Nallanathan A.; Flanagan M.F.
2022Ergodic Performance of Downlink Untrusted NOMA System with Imperfect SICHota P.K.; Thapar S.; Mishra D.; Saini R.; Dubey A.
2022Exact Outage Analysis for Non-regenerative Secure Cooperation Against Double-tap EavesdroppingVenugopalachary K.; Mishra D.; Saini R.
2020Novel Outage-Aware NOMA Protocol for Secrecy Fairness Maximization among Untrusted UsersThapar S.; Mishra D.; Saini R.
2023On the Effect of Phase Error on Physical Layer Security of RIS-Aided NOMA NetworkKhan Y.; Dubey A.
2018On the Performance of GSC/MRC based Cognitive Radio Networks with Multiple Primary UsersThakur S.; Thakur A.; Soni S.; Singh A.
2022Optimal Friendly Jamming and Transmit Power Allocation in RIS-assisted Secure CommunicationWafai B.; Kundu C.; Dubey A.; Flanagan M.F.
2020Recurrent Neural Network Assisted Transmitter Selection for Secrecy in Cognitive Radio NetworkTripathi S.; Kundu C.; Dobre O.A.; Bansal A.; Flanagan M.F.
2020Secrecy Outage Performance of SWIPT Cognitive Radio Network with Imperfect CSISingh A.; Bhatnagar M.R.; Mallik R.K.
2023Secrecy Performance of Energy Harvesting Based D2D Communications in Spectrum-Sharing NetworksKumar S.; Thakur S.; Singh A.
2022Secure NOMA for Maximizing Ergodic Secrecy Fairness in the Presence of Untrusted UsersHota P.K.; Mishra D.; Saini R.; Dubey A.
2023Secure Transmission in NOMA-enabled Industrial IoT with Resource-Constrained Untrusted DevicesThapar S.; Mishra D.; Saini R.