Login / Signup
Secure Relaying in Non-Orthogonal Multiple Access: Trusted and Untrusted Scenarios.
Ahmed Arafa
Wonjae Shin
Mojtaba Vaezi
H. Vincent Poor
Published in:
IEEE Trans. Inf. Forensics Secur. (2020)
Keyphrases
</>
multiple access
communication systems
sensitive data
trusted computing
secure multi party
wireless communication
third party
base station
privacy preserving
multi user
wireless networks
division multiple access
data storage
sensitive information
trust relationships
security protocols