Articles with "multiple eavesdroppers" as a keyword



Photo by alterego_swiss from unsplash

A Stochastic Beamforming Algorithm for Wireless Sensor Network with Multiple Relays and Multiple Eavesdroppers

Sign Up to like & get
recommendations!
Published in 2021 at "Wireless Personal Communications"

DOI: 10.1007/s11277-020-07778-1

Abstract: The information security rate of wireless sensor network with multiple eavesdroppers and multiple relays has been a research hotspot in recent years. In the scene of channel state information varies slowly, prior state information of… read more here.

Keywords: information; wireless sensor; network multiple; sensor network ... See more keywords
Photo by davidvives from unsplash

Secure Mobile Edge Computing Networks in the Presence of Multiple Eavesdroppers

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Communications"

DOI: 10.1109/tcomm.2021.3119075

Abstract: In this paper, we investigate a secure mobile edge computing (MEC) network in the presence of multiple eavesdroppers, where multiple users can offload parts of their tasks to the computational access point (CAP). The multiple… read more here.

Keywords: mobile edge; secure mobile; presence multiple; edge computing ... See more keywords