Skip navigation
Home
Browse
Communities
& Collections
Browse Items by:
Issue Date
Author
Title
Subject
Help
Sign on to:
My DSpace
Receive email
updates
Edit Profile
IDR@IIT Jammu
Browsing by Subject physical layer security
Jump to:
0-9
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
or enter first few letters:
Sort by:
title
issue date
submit date
In order:
Ascending
Descending
Results/Page
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Authors/Record:
All
1
5
10
15
20
25
30
35
40
45
50
Showing results 1 to 12 of 12
Issue Date
Title
Author(s)
2023
Destination Scheduling for Secure Pinhole-Based Power-Line Communication
Kundu C.
;
Dubey A.
;
Tonello A.M.
;
Nallanathan A.
;
Flanagan M.F.
2022
Ergodic Performance of Downlink Untrusted NOMA System with Imperfect SIC
Hota P.K.
;
Thapar S.
;
Mishra D.
;
Saini R.
;
Dubey A.
2022
Exact Outage Analysis for Non-regenerative Secure Cooperation Against Double-tap Eavesdropping
Venugopalachary K.
;
Mishra D.
;
Saini R.
2020
Novel Outage-Aware NOMA Protocol for Secrecy Fairness Maximization among Untrusted Users
Thapar S.
;
Mishra D.
;
Saini R.
2023
On the Effect of Phase Error on Physical Layer Security of RIS-Aided NOMA Network
Khan Y.
;
Dubey A.
2018
On the Performance of GSC/MRC based Cognitive Radio Networks with Multiple Primary Users
Thakur S.
;
Thakur A.
;
Soni S.
;
Singh A.
2022
Optimal Friendly Jamming and Transmit Power Allocation in RIS-assisted Secure Communication
Wafai B.
;
Kundu C.
;
Dubey A.
;
Flanagan M.F.
2020
Recurrent Neural Network Assisted Transmitter Selection for Secrecy in Cognitive Radio Network
Tripathi S.
;
Kundu C.
;
Dobre O.A.
;
Bansal A.
;
Flanagan M.F.
2020
Secrecy Outage Performance of SWIPT Cognitive Radio Network with Imperfect CSI
Singh A.
;
Bhatnagar M.R.
;
Mallik R.K.
2023
Secrecy Performance of Energy Harvesting Based D2D Communications in Spectrum-Sharing Networks
Kumar S.
;
Thakur S.
;
Singh A.
2022
Secure NOMA for Maximizing Ergodic Secrecy Fairness in the Presence of Untrusted Users
Hota P.K.
;
Mishra D.
;
Saini R.
;
Dubey A.
2023
Secure Transmission in NOMA-enabled Industrial IoT with Resource-Constrained Untrusted Devices
Thapar S.
;
Mishra D.
;
Saini R.