Author of the publication

Beamforming for secrecy rate maximization under outage constraints and partial CSI.

, , and . ACSCC, page 193-197. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Wiretap-channels with constrained active attacks., , and . ACSSC, page 1984-1988. IEEE, (2014)Energy Models for Communication of Future Computing Platforms., , , , and . ICUWB, page 1-5. IEEE, (2015)Noise mitigated compressed sensing., , , and . TSP, page 1-5. IEEE, (2015)Weak Secrecy in the Multiway Untrusted Relay Channel With Compute-and-Forward., , , and . IEEE Trans. Information Forensics and Security, 10 (6): 1262-1273 (2015)An efficient branch-and-bound algorithm for compute-and-forward., , and . PIMRC, page 77-82. IEEE, (2012)Transmit beamforming for inter-operator spectrum sharing., , , , , , , , , and 1 other author(s). Future Network & Mobile Summit, page 1-8. IEEE, (2011)Beamforming for secrecy rate maximization under outage constraints and partial CSI., , and . ACSCC, page 193-197. IEEE, (2011)Secrecy in the two-way untrusted relay channel with compute-and-forward., , , and . ICC, page 4357-4362. IEEE, (2015)Confidential Network Coding: Physical Layer vs. Network Layer., , , , and . ICUWB, page 1-5. IEEE, (2015)Secure and energy-efficient interconnects for board-to-board communication., , , , , , , , , and 5 other author(s). ICUWB, page 1-7. IEEE, (2017)