Abstract: In this paper, we analyze the performance of the physical layer security for the classic Wyner's three-node model (including an eavesdropper) over ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results