Login / Signup

A method enabling exploitation of spatial diversity and physical layer security in an extreme case of source-wiretapping without a jamming beamformer.

Truc Thanh TranHyung Yun Kong
Published in: J. Commun. Networks (2015)
Keyphrases
  • computer systems
  • physical layer
  • computational complexity
  • computer simulation