ePrints@IIScePrints@IISc Home | About | Browse | Latest Additions | Advanced Search | Contact | Help

Browse by Author

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 3.

Conference Paper

Shah, Shahid M and Kumar, Vireshwar and Sharma, Vinod (2012) Achievable secrecy sum-rate in a fading MAC-WT with power control and without CSI of eavesdropper. In: 2012 International Conference on Signal Processing and Communications (SPCOM), 22-25 July 2012, Bangalore.

Rajesh, R and Shah, Shahid M and Sharma, Vinod (2012) On secrecy above secrecy capacity. In: 2012 IEEE International Conference on Communication Systems (ICCS), 21-23 Nov. 2012, Singapore.

Journal Article

Shah, Shahid M and Chaitanya, Krishna A and Sharma, Vinod (2017) Resource allocation in a MAC with and without security via game theoretic learning. In: EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING .

This list was generated on Fri Mar 29 13:48:40 2024 IST.