@dblp

Beating resource constrained eavesdroppers: A physical layer security study.

, , and . WiOpt, page 167-174. IEEE, (2015)

Links and resources

Tags