Author of the publication

Weak Secrecy in the Multiway Untrusted Relay Channel With Compute-and-Forward.

, , , and . IEEE Trans. Inf. Forensics Secur., 10 (6): 1262-1273 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient branch-and-bound algorithm for compute-and-forward., , and . PIMRC, page 77-82. IEEE, (2012)Noise mitigated compressed sensing., , , and . TSP, page 1-5. IEEE, (2015)Weak Secrecy in the Multiway Untrusted Relay Channel With Compute-and-Forward., , , and . IEEE Trans. Inf. Forensics Secur., 10 (6): 1262-1273 (2015)Wiretap-channels with constrained active attacks., , and . ACSSC, page 1984-1988. IEEE, (2014)Lightweight Generator of Synthetic IMU Sensor Data for Accurate AHRS Analysis., , , , and . ARSO, page 122-127. IEEE, (2023)Secure and energy-efficient interconnects for board-to-board communication., , , , , , , , , and 5 other author(s). ICUWB, page 1-7. IEEE, (2017)An Overview of the NET Playground - A Heterogeneous, Multi-Functional Network Test Bed., , , , , and . CoRR, (2023)Practical construction of sensing matrices for a greedy sparse recovery algorithm over finite fields., , , and . DCC, page 120-129. IEEE, (2023)Beamforming for secrecy rate maximization under outage constraints and partial CSI., , and . ACSCC, page 193-197. IEEE, (2011)Secrecy in the two-way untrusted relay channel with compute-and-forward., , , and . ICC, page 4357-4362. IEEE, (2015)