Author of the publication

Secure Millimeter-Wave Ad Hoc Communications Using Physical Layer Security.

, , , and . IEEE Trans. Inf. Forensics Secur., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Friendship-based cooperative jamming for secure communication in Poisson networks., , and . Wireless Networks, 25 (7): 4077-4095 (2019)Cost-Efficient Blockchain-Based Access Control for the Internet of Things., , , and . GLOBECOM, page 1-6. IEEE, (2021)On Eavesdropper-Tolerance Capability of Two-Hop Wireless Networks., , , and . CoRR, (2013)Mode Selection and Spectrum Partition for D2D Inband Communications: A Physical Layer Security Perspective., , , and . CoRR, (2018)Mode Selection and Spectrum Partition for D2D Inband Communications: A Physical Layer Security Perspective., , , and . IEEE Trans. Communications, 67 (1): 623-638 (2019)On Secure Wireless Communications for Service Oriented Computing., , , , and . IEEE Trans. Services Computing, 11 (2): 318-328 (2018)Optimal Relay-Destination Pair Selection Mechanism for Secure Communications in Wireless Cooperative Relay Networks., , , and . NaNA, page 84-89. IEEE Computer Society, (2016)Exact Secrecy Throughput of MANETs with Guard Zone., , , , and . NaNA, page 167-172. IEEE, (2016)Exploring Relay Cooperation for Secure and Reliable Transmission in Two-HopWireless Networks., and . EAI Endorsed Trans. Scalable Information Systems, 1 (2): e2 (2014)Friendship-based Cooperative Jamming for Secure Communication in Poisson Networks., , , and . CoRR, (2016)