Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Proactive Attack: A Strategy for Legitimate Eavesdropping
Malardalen Univ, SWE.
Blekinge Institute of Technology, Faculty of Computing, Department of Communication Systems.
2016 (English)In: 2016 IEEE Sixth International Conference on Communications and Electronics (ICCE), IEEE, 2016, 457-461 p.Conference paper, Published paper (Refereed)
Place, publisher, year, edition, pages
IEEE, 2016. 457-461 p.
Keyword [en]
Physical Layer Security; Secrecy Capacity; Power Allocation; Cognitive Radio Networks; Spectrum Underlay Networks; Performance Analysis
National Category
Communication Systems
Identifiers
URN: urn:nbn:se:bth-13682ISI: 000389228000075ISBN: 978-1-5090-1801-7 (print)OAI: oai:DiVA.org:bth-13682DiVA: diva2:1060814
Conference
IEEE 6th International Conference on Communications and Electronics (IEEE ICCE), JUL 27-29, 2016, Ha Long, VIETNAM
Available from: 2016-12-30 Created: 2016-12-30 Last updated: 2016-12-30Bibliographically approved

Open Access in DiVA

No full text

Search in DiVA

By author/editor
Zepernick, Hans-Jürgen
By organisation
Department of Communication Systems
Communication Systems

Search outside of DiVA

GoogleGoogle Scholar

Total: 50 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf