Login / Signup
A method enabling exploitation of spatial diversity and physical layer security in an extreme case of source-wiretapping without a jamming beamformer.
Truc Thanh Tran
Hyung Yun Kong
Published in:
J. Commun. Networks (2015)
Keyphrases
</>
computer systems
physical layer
computational complexity
computer simulation