News
Abstract: This paper presents the optimal physical-layer security scheme of both primary user (PU) and secondary user (SU) in the underlay multiple-input multiple-output cognitive-radio network ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results