Login / Signup
Performance Comparison between Fountain Codes-Based Secure MIMO Protocols with and without Using Non-Orthogonal Multiple Access.
Dang The Hung
Tran Trung Duy
Phuong T. Tran
Quoc Trinh Do
Tan Hanh
Published in:
Entropy (2019)
Keyphrases
</>
multiple access
communication systems
security protocols
cryptographic protocols
wireless communication
authentication protocol
multi user
key exchange
space time block codes
error correction
multi party
wireless channels
key agreement protocol
key establishment
frequency hopping
virtual environment