Login / Signup
The multiple-access channel with an external eavesdropper: Trusted vs. untrusted users.
Mario Goldenbaum
Rafael F. Schaefer
H. Vincent Poor
Published in:
ACSSC (2015)
Keyphrases
</>
multiple access
communication systems
wireless communication
multi user
user interface
end users
third party
multiple users
user profiles
recommender systems
single user
frequency hopping
computer systems
privacy preserving
mobile applications
division multiple access