Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Proactive Attack: A Strategy for Legitimate Eavesdropping
Malardalen Univ, SWE.
Blekinge Institute of Technology, Faculty of Computing, Department of Communication Systems.ORCID iD: 0000-0003-3604-2766
2016 (English)In: 2016 IEEE Sixth International Conference on Communications and Electronics (ICCE), IEEE, 2016, p. 457-461Conference paper, Published paper (Refereed)
Place, publisher, year, edition, pages
IEEE, 2016. p. 457-461
Keywords [en]
Physical Layer Security; Secrecy Capacity; Power Allocation; Cognitive Radio Networks; Spectrum Underlay Networks; Performance Analysis
National Category
Communication Systems
Identifiers
URN: urn:nbn:se:bth-13682ISI: 000389228000075ISBN: 978-1-5090-1801-7 (print)OAI: oai:DiVA.org:bth-13682DiVA, id: diva2:1060814
Conference
IEEE 6th International Conference on Communications and Electronics (IEEE ICCE), JUL 27-29, 2016, Ha Long, VIETNAM
Available from: 2016-12-30 Created: 2016-12-30 Last updated: 2021-05-03Bibliographically approved

Open Access in DiVA

No full text in DiVA

Authority records

Zepernick, Hans-Jürgen

Search in DiVA

By author/editor
Zepernick, Hans-Jürgen
By organisation
Department of Communication Systems
Communication Systems

Search outside of DiVA

GoogleGoogle Scholar

isbn
urn-nbn

Altmetric score

isbn
urn-nbn
Total: 112 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf