Search

Your search keyword '"TELECOMMUNICATION security"' showing total 35 results

Search Constraints

Start Over You searched for: Descriptor "TELECOMMUNICATION security" Remove constraint Descriptor: "TELECOMMUNICATION security" Journal electronics letters (wiley-blackwell) Remove constraint Journal: electronics letters (wiley-blackwell)
35 results on '"TELECOMMUNICATION security"'

Search Results

1. Specific emitter identification under extremely small sample conditions via chaotic integration.

2. A coding scheme to force the eavesdropper falling in error avalanche.

3. Intrusion detection and defence for CAN bus through frequency anomaly analysis and arbitration mechanism.

4. Secrecy outage analysis of satellite communication networks with hardware impairments and channel estimation errors.

5. Comments on 'Precoding for secrecy rate maximisation in cognitive MIMO wiretap channels'.

6. Secrecy capacity and optimal time allocation for MISO wiretap channel with a multiple-antennas jammer.

7. CSO secret communication.

8. Two‐dimensional encryption system for secure free‐space optical communication of time‐series data streams.

9. Secrecy outage analysis of double shadowed Rician channels.

10. Low‐cost robust anti‐removal logic for protecting functionally obfuscated DSP core against removal attack.

11. Secure communication in multigroup multicasting cell‐free massive MIMO networks with active spoofing attack.

12. Generalised moment generating function‐based secrecy performance analysis over Fisher–Snedecor F composite fading channels.

13. Performance analysis in wireless key generation using estimated channel state information.

14. Media‐based modulation for secrecy communications.

15. Spatial signature for secure MISO‐OFDM systems.

16. Channel correlation‐based relay attack avoidance in vehicle keyless‐entry systems.

17. Symbol separation and beamforming to improve secure transmission in multi‐untrusted relay networks.

18. Randomness evaluation of key generation based on optical OFDM system in visible light communication networks.

19. Security‐oriented distributed access selection for D2D underlaying cellular networks.

20. Performance analysis of physical layer security over α–μ fading channel.

21. Optimal Byzantine attack strategy for distributed localisation with M‐ary quantised data.

22. Secure DNA data compression using algebraic curves.

23. GRP‐based interleaver for IDMA systems over frequency selective channel.

24. Chaos‐based selected mapping scheme for physical layer security in OFDM‐PON.

25. Frequency diverse array OFDM transmitter for secure wireless communication.

26. Wireless physical layer network coding in potential presence of malicious relays – incomplete information game approach.

27. Joint optimisation of secret key capacity and sparse channel estimation based on pilot power allocation.

28. Covert communication using skewed α‐stable distributions.

29. Detecting age groups using touch interaction based on neuromotor characteristics.

30. Secrecy throughput of MISO single‐eavesdropper ropper networks with imperfect channel state information.

31. Relay selection for secure backscatter wireless communications.

32. Key renewal scheme with sensor authentication under clustered wireless sensor networks.

33. Power allocation for secure OFDMA systems with wireless information and power transfer.

Catalog

Books, media, physical & digital resources