Author of the publication

Analysis of Secret Key Agreement Protocol for Massive MIMO Systems.

, , , , , and . CISIS-ICEUTE, volume 532 of Lecture Notes in Networks and Systems, page 86-94. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of users suspected of using multiple user accounts and manipulating evaluations in a community site., , , , , and . NLPKE, page 1-8. IEEE, (2010)A New Noncoherent Gaussian Signaling Scheme for Low Probability of Detection Communications., , , and . CoRR, (2023)Grover Adaptive Search for Joint Maximum-Likelihood Detection of Power-Domain Non-Orthogonal Multiple Access., and . VTC2023-Spring, page 1-5. IEEE, (2023)Analysis of Secret Key Agreement Protocol for Massive MIMO Systems., , , , , and . CISIS-ICEUTE, volume 532 of Lecture Notes in Networks and Systems, page 86-94. Springer, (2022)Multiple Superimposed Pilots for Accurate Channel Estimation in Orthogonal Time Frequency Space Modulation., , , , and . VTC Fall, page 1-5. IEEE, (2023)Detection of submitters suspected of pretending to be someone else in a community site., , , , and . LREC, European Language Resources Association, (2010)Sixty Years of Coherent Versus Non-Coherent Tradeoffs and the Road From 5G to Wireless Futures., , , , , , , and . IEEE Access, (2019)Designing of a Network Infrastructure to Promote Active Participation of Youth in Local Community Revitalization., , and . IIAI-AAI, page 896-901. IEEE, (2019)Detection of Users Suspected of Pretending to Be Other Users in a Community Site by Using Messages Submitted to Non-Target Categories., , , , and . PACLIC, page 637-644. Institute for Digital Enhancement of Cognitive Development, Waseda University, (2010)Detection of Submitters Suspected of Pretending to be Someone Else to Manipulate Communications in a Community Site., , , , and . CSEDU (1), page 166-171. INSTICC Press, (2010)