The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we study a Multiple-Input Multiple-Output (MIMO) communication scenario through Rayleigh fading cognitive radio channel in which two users, called the primary and the secondary (cognitive) users wish to communicate with two different receivers, subject to the mutual interference. The cognitive user has the causal knowledge of the message being sent by the primary user and is allowed...
In this paper, a wireless multicast scenario is considered in which the transmitter sends a common message to multiple client receivers in the presence of an eavesdropper. We are interested in protecting this common message against eavesdropping. Based on an information-theoretic formulation of the problem, in which the transmitter and the mutually independent multiple client receivers communicate...
In this paper, we study a Multiple-Input Multiple-Output (MIMO) communication scenario through Rayleigh fading cognitive radio channel in which two users, called the primary and the secondary users wish to communicate with two different receivers, in the presence of a cognitive relay. We assume that the secondary user transmits simultaneously with the primary user over the same channel instead of...
This paper is concerned with the transmission of confidential message through Nakagami-m fading wireless channel in the presence of multiple eavesdroppers. The eavesdroppers are mutually independent and the information is secure if it cannot be eavesdropped by any eavesdropper. Considering the problem of secret communications between two nodes over Nakagami-m fading channel where a number of eavesdroppers...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.