Secure Communications for the Two-user Broadcast Channel with Random Traffic.

IEEE Transactions on Information Forensics and Security(2018)

引用 11|浏览42
暂无评分
摘要
In this paper, we study the stability region of the two-user broadcast channel (BC) with bursty data arrivals and security constraints. It is assumed that one of the receivers has a secrecy constraint, i.e., its packets need to be kept secret from the other receiver, which is defined based on signal to interference noise ratio. The receiver with secrecy constraint has full-duplex capability to sen...
更多
查看译文
关键词
Receivers,Stability analysis,Decoding,Transmitters,Jamming,Throughput,Interference
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要