Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2017.2765500
Abstract: Transmit beamforming and artificial noise-based methods have been widely employed to achieve physical-layer (PHY) security. However, these approaches may fail to provide satisfactory secure performance if the channels of legitimate user (LU) and eavesdropper (Eve)…
read more here.
Keywords:
array;
user eavesdropper;
frequency;
physical layer ... See more keywords