File list (Check if you may need any files):
reference of digital communication
..................................\1-Detection of Active Eavesdropping Attack by Spoofing Relay in Multiple Antenna Systems.pdf
..................................\10-Secure Transmission in Interference Alignment (IA)-Based Networks with Artificial Noise.pdf
..................................\11-Transmit optimization for secure MIMO RFID wireless communication.pdf
..................................\12-Analysis of secure communication in millimeter wave networks Are blockages beneficial.pdf
..................................\13-Securing Massive MIMO Via Power Scaling.pdf
..................................\14-An efficient physical layer security algorithm for two-way relay systems.pdf
..................................\15-Sum secrecy rate maximization for full-duplex two-way relay networks.pdf
..................................\2-Wiretap channel with finite-rate feedback.pdf
..................................\3-Opportunistic Jamming for Enhancing Security Stochastic Geometry Modeling and Analysis.pdf
..................................\4-Beamforming design for secure downlink transmission of MU-MIMO systems with multi-antenna eavesdropper.pdf
..................................\5-Secret key exchange under physical layer security using MIMO private random precoding in FDD systems.pdf
..................................\6-Security QoS-aware route selection in multi-hop wireless ad hoc networks.pdf
..................................\7-Non-cooperative and cooperative PUEA detection using physical layer in mobile OFDM-based cognitive radio networks.pdf
..................................\8-On the Secrecy Rate Maximization with Uncoordinated Cooperative Jamming by Single-Antenna Helpers.pdf
..................................\9-Transmitter Optimization in Slow Fading MISO Wiretap Channel.pdf