Sign in

Exploiting Uplink NOMA to Improve Sum Secrecy Throughput in IoT Networks.

Zhongwu XiangWeiwei YangYueming CaiYunpeng ChengHeng WuMeng Wang
Published in: Wirel. Commun. Mob. Comput. (2018)
Keyphrases
  • social networks
  • management system
  • response time
  • cloud computing
  • key management
  • scheduling problem