Login / Signup
Secure Downlink Transmission with IRS-assisted Eavesdropper and Legitimate User.
Bing Wang
Huici Wu
Xiaofeng Tao
Jin Xu
Published in:
ICCC (2023)
Keyphrases
</>
user authentication
user preferences
resource allocation
user profiles
relevance feedback
user queries
user satisfaction
security issues
user centric
key management
application layer