Sign in

The multiple-access channel with an external eavesdropper: Trusted vs. untrusted users.

Mario GoldenbaumRafael F. SchaeferH. Vincent Poor
Published in: ACSSC (2015)
Keyphrases