Inproceedings,

Security Analysis of Overlay Cognitive Wireless Networks with an Untrusted Secondary User.

, , , , , , , and .
ICSPCC, page 1-5. IEEE, (2018)

Meta data

Tags

Users

  • @dblp

Comments and Reviews