Articles with "legitimate monitor" as a keyword



Photo from academic.microsoft.com

Proactive Eavesdropping in Relaying Systems

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Signal Processing Letters"

DOI: 10.1109/lsp.2017.2696305

Abstract: This letter investigates the performance of a legitimate surveillance system, where a legitimate monitor aims to eavesdrop on a dubious decode-and-forward relaying communication link. In order to maximize the effective eavesdropping rate, two strategies are… read more here.

Keywords: relaying systems; legitimate monitor; eavesdropping relaying; performance ... See more keywords