Works matching IS 10745351 AND DT 2015 AND VI 28 AND IP 2
Results: 15
Achievable rate region with secrecy constraints for secure communication in two-way relay networks.
- Published in:
- International Journal of Communication Systems, 2015, v. 28, n. 2, p. 231, doi. 10.1002/dac.2663
- By:
- Publication type:
- Article
Time domain leakage in DFT-based channel estimation for OFDM systems with guard bands.
- Published in:
- International Journal of Communication Systems, 2015, v. 28, n. 2, p. 250, doi. 10.1002/dac.2664
- By:
- Publication type:
- Article
Authenticated key exchange protocol under computational Diffie-Hellman assumption from trapdoor test technique.
- Published in:
- International Journal of Communication Systems, 2015, v. 28, n. 2, p. 325, doi. 10.1002/dac.2671
- By:
- Publication type:
- Article
Dynamic Orthogonal Frequency Division Multiple Access resource management for downlink interference avoidance in two-tier networks.
- Published in:
- International Journal of Communication Systems, 2015, v. 28, n. 2, p. 281, doi. 10.1002/dac.2668
- By:
- Publication type:
- Article
BOD-LEACH: broadcasting over duty-cycled radio using LEACH clustering for delay/power efficient dissimilation in wireless sensor networks.
- Published in:
- International Journal of Communication Systems, 2015, v. 28, n. 2, p. 296, doi. 10.1002/dac.2669
- By:
- Publication type:
- Article
Unified performance analysis of maximal-ratio combining for spectrum sharing systems with antenna correlation.
- Published in:
- International Journal of Communication Systems, 2015, v. 28, n. 2, p. 201, doi. 10.1002/dac.2564
- By:
- Publication type:
- Article
Recursive-clustering-based approach for denial of service (DoS) attacks in wireless sensors networks.
- Published in:
- International Journal of Communication Systems, 2015, v. 28, n. 2, p. 309, doi. 10.1002/dac.2670
- By:
- Publication type:
- Article
An efficient communication relay placement algorithm for content-centric wireless mesh networks.
- Published in:
- International Journal of Communication Systems, 2015, v. 28, n. 2, p. 262, doi. 10.1002/dac.2666
- By:
- Publication type:
- Article
An improved and provable self-certified digital signature scheme with message recovery.
- Published in:
- International Journal of Communication Systems, 2015, v. 28, n. 2, p. 344, doi. 10.1002/dac.2673
- By:
- Publication type:
- Article
Spectrum defragmentation in flexgrid optical networks using a genetic algorithm.
- Published in:
- International Journal of Communication Systems, 2015, v. 28, n. 2, p. 358, doi. 10.1002/dac.2675
- By:
- Publication type:
- Article
Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update.
- Published in:
- International Journal of Communication Systems, 2015, v. 28, n. 2, p. 374, doi. 10.1002/dac.2676
- By:
- Publication type:
- Article
Issue Information.
- Published in:
- 2015
- Publication type:
- Other
Improvement of robust smart-card-based password authentication scheme.
- Published in:
- International Journal of Communication Systems, 2015, v. 28, n. 2, p. 383, doi. 10.1002/dac.2644
- By:
- Publication type:
- Article
An amplify-and-forward and decode-and-forward mixed relay communication system and its performance analysis.
- Published in:
- International Journal of Communication Systems, 2015, v. 28, n. 2, p. 394, doi. 10.1002/dac.2646
- By:
- Publication type:
- Article
Extracting mobility pattern from target trajectory in wireless sensor networks.
- Published in:
- International Journal of Communication Systems, 2015, v. 28, n. 2, p. 213, doi. 10.1002/dac.2649
- By:
- Publication type:
- Article