A Secure Downlink NOMA Scheme Against Unknown Internal Eavesdroppers.
Abdelrahman AbushattalSaud AlthunibatMarwa K. QaraqeHüseyin ArslanPublished in: IEEE Wirel. Commun. Lett. (2021)
Keyphrases
- authentication scheme
- secret sharing
- security analysis
- key distribution
- secure communication
- public key encryption
- resource allocation
- authentication mechanism
- key management
- security model
- data encryption
- key management scheme
- electronic voting
- encryption scheme
- diffie hellman
- traffic load
- key exchange
- protection scheme
- internal and external
- multi party