Secure Relaying in Non-Orthogonal Multiple Access: Trusted and Untrusted Scenarios.
Ahmed ArafaWonjae ShinMojtaba VaeziH. Vincent PoorPublished in: CoRR (2018)
Keyphrases
- multiple access
- communication systems
- trusted computing
- sensitive data
- secure multi party
- multi user
- wireless communication
- third party
- frequency hopping
- privacy preserving
- division multiple access
- encrypted data
- code division multiple access
- security policies
- distributed environment
- trusted platform module
- data privacy
- identity management
- key management
- information systems
- estimation algorithm
- expert systems