2012
DOI: 10.1615/telecomradeng.v71.i16.30
|View full text |Cite
|
Sign up to set email alerts
|

Refined Model for Calculation of Limiting Secret Efficiency of Wi-Fi Communication Channel

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…The different objectives of the design are; application-based, routing-based, and topology-based. Also, the steps involved in the design include design hierarchy, place platforms, design paths, design topology, manager checks, and design MAC schedules [22][23][24].…”
Section: Introductionmentioning
confidence: 99%
“…The different objectives of the design are; application-based, routing-based, and topology-based. Also, the steps involved in the design include design hierarchy, place platforms, design paths, design topology, manager checks, and design MAC schedules [22][23][24].…”
Section: Introductionmentioning
confidence: 99%
“…To prevent becoming a victim of cybercrime in the modern world, both the sender and the intended receiver may rest easy. Data must be transformed into unreadable formats to be safeguarded and delivered without incident [5,6]. The cloud was successfully transformed into an open area thanks to the use of digital technology for a variety of tasks including replication, distribution, and uploading [7].…”
Section: Introductionmentioning
confidence: 99%