共 27 条
- [2] Divya Thatha, 2015, Proceedings of 2015 Global Conference on Communication Technologies (GCCT), P682, DOI 10.1109/GCCT.2015.7342749
- [4] Duong TQ, 2009, IEEE WCNC, P273
- [6] Gawtham KD, 2016, 2016 IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), P62, DOI 10.1109/RTEICT.2016.7807783
- [8] Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02): : 1773 - 1828
- [9] He KM, 2010, LECT NOTES COMPUT SC, V6311, P1
- [10] Jindal P, 2015, ANAL SECURITY PERFOR, DOI [10.1109/CCAA.2015.7148425, DOI 10.1109/CCAA.2015.7148425]