共 50 条
[41]
Application-binding protocol in the user centric smart card ownership model
[J].
Lect. Notes Comput. Sci.,
(208-225)
[44]
Security Analysis of TBPKI-2 Protocol Based on Minimal Element Theory
[J].
International Journal of Network Security,
2022, 24 (06)
:1081-1088
[45]
A performance of security aspect in WiMAX physical layer with different modulation schemes
[J].
Communications in Computer and Information Science,
2011, 125 CCIS
:433-440
[47]
Evaluating the Performance of Cooperative NOMA with Energy Harvesting Under Physical Layer Security
[J].
Wireless Personal Communications,
2019, 108 (02)
:1037-1054
[49]
Data Security Analysis of PHY Layer Using Artificial Intelligence and Machine Learning
[J].
2023 9th International Conference on Advanced Computing and Communication Systems, ICACCS 2023,
2023,
:2507-2515