Author of the publication

Power Allocation in Multiuser Parallel Gaussian Broadcast Channels With Common and Confidential Messages.

, , and . IEEE Trans. Commun., 64 (6): 2326-2339 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LQG cheap control subject to packet loss and SNR limitations., , , and . ECC, page 2374-2379. IEEE, (2013)LQG cheap control over SNR-limited lossy channels with delay., , , and . CDC, page 3988-3993. IEEE, (2013)An Analysis of GLRT Packet Detection for WiMedia UWB Applications., and . IEEE Trans. Vehicular Technology, 59 (3): 1229-1241 (2010)Performance Evaluation of an Indistinguishability Based Attack Against Spreading Code Secured GNSS Signals., , , and . PLANS, page 542-552. IEEE, (2023)Parallel BCC with one common and two confidential messages and imperfect CSIT., , and . GLOBECOM Workshops, page 1373-1378. IEEE, (2014)Optimal Compromise among Security, Availability and Resources in the Design of Sequences for GNSS Spreading Code Authentication., and . ICL-GNSS, page 1-6. IEEE, (2020)Physical Layer Authentication over MIMO Fading Wiretap Channels., , and . IEEE Trans. Wirel. Commun., 11 (7): 2564-2573 (2012)Design optimization for quantum communications in a GNSS intersatellite network., , , , , , , and . ICL-GNSS, page 1-6. IEEE, (2013)Energy-based anchor node selection for IoT physical layer authentication., , , , and . ICC, page 1-6. IEEE, (2016)A game-theoretic analysis of energy-depleting jamming attacks., , , , and . ICNC, page 100-104. IEEE Computer Society, (2017)