Login / Signup
Performance Analysis of PLS key generation-based Secure NOMA-enabled IoT Networks in the presence of Untrusted Users.
Hela Chamkhia
Abdulla K. Al-Ali
Amr Mohamed
Mohsen Guizani
Aiman Erbad
Ahmed Refaey
Published in:
WF-IoT (2021)
Keyphrases
</>
partial least squares
user interface
end users
location information
social networks
social media
user centric
user privacy
sensitive data
third party
user experience
network structure
user profiles
management system
recommender systems
mobile applications
privacy preserving
security policies
cloud computing