2019 IEEE International Conference on Telecommunications and Photonics (ICTP) 2019
DOI: 10.1109/ictp48844.2019.9041722
|View full text |Cite
|
Sign up to set email alerts
|

Enhancement of Secrecy Multicast Capacity over k - µ Shadowed Fading Channel

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…Similar to the method of solving I 1 , we substitute ( 24) into (33) to gain formula (36), and then, we combine ( 14) and (36) to get the exact expression of I 2 as…”
Section: Appendix a The Proof Of Theoremmentioning
confidence: 99%
See 2 more Smart Citations
“…Similar to the method of solving I 1 , we substitute ( 24) into (33) to gain formula (36), and then, we combine ( 14) and (36) to get the exact expression of I 2 as…”
Section: Appendix a The Proof Of Theoremmentioning
confidence: 99%
“…Due to its composite characteristics, the channels can be applied to many scenarios. As shown in [33], a secure multicast scheme under κ-μ shadowed fading with multiple users and multiple eavesdroppers was studied. Sun et al in [34] investigated the security performance of the single-input multiple-output relay communication architecture over the κ-μ shadowed distribution by deriving the precise and approximate expressions of SOP and SPSC.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Substituting ( 23) and ( 25) into (33) and performing integration using [39, eqs (3.351.1, 3.351.3)], the closed-form expression of PNSMC is obtained in (34), where…”
Section: Non-zero Secrecy Capacity Analysismentioning
confidence: 99%