Login / Signup

Secure Downlink Transmission with IRS-assisted Eavesdropper and Legitimate User.

Bing WangHuici WuXiaofeng TaoJin Xu
Published in: ICCC (2023)
Keyphrases
  • user authentication
  • user preferences
  • resource allocation
  • user profiles
  • relevance feedback
  • user queries
  • user satisfaction
  • security issues
  • user centric
  • key management
  • application layer