Author:
Hong Siyuan,Lu Xiaozhen,Xiao Liang,Niu Guohang,Yang Helin
Publisher
Springer International Publishing
Reference18 articles.
1. He, D., Zeadally, S., Kumar, N., Lee, J.-H.: Anonymous authentication for wireless body area networks with provable security. IEEE Syst. J. 11(4), 2590–2601 (2017)
2. Tang, X., Ren, P., Wang, Y., Han, Z.: Combating full-duplex active eavesdropper: a hierarchical game perspective. IEEE Trans. Commun. 65(3), 1379–1395 (2017)
3. Osorio, D.P.M., Alves, H., Olivo, E.E.B.: On the secrecy performance and power allocation in relaying networks with untrusted relay in the partial secrecy regime. IEEE Trans. Inf. Forensics Secur. 1(15), 2268–2281 (2019)
4. Zhang, H., Xing, H., Cheng, J., Nallanathan, A., Leung, V.C.M.: Secure resource allocation for OFDMA two-way relay wireless sensor networks without and with cooperative jamming. IEEE Trans. Ind. Informat. 12(5), 1714–1725 (2016)
5. Hamamreh, J.M., Furqan, H.M., Arslan, H.: Classifications and applications of physical layer security techniques for confidentiality: a comprehensive survey. IEEE Commun. Surveys Tuts. 21(2), 1773–1828 (2018)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献