没有合适的资源?快使用搜索试试~ 我知道了~
温馨提示
试读
13页
Recently, the physical layer security technologies based on artificial noise and beamforming has been getting in focus. Although those schemes provide an idea to design security policies for wireless networks, most existing works mainly concentrate on the secrecy capacity analysis for known Channel State Information (CSI) of eavesdroppers, as well as the corresponding power allocation and algorithm optimization. Since the eavesdroppers may hide their own personal state information and steal conf
资源推荐
资源评论
资源评论
weixin_38743054
- 粉丝: 8
- 资源: 943
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功