UAV Secure Downlink NOMA Transmissions: A Secure Users Oriented Perspective

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Communications in NOMA System: Subcarrier Assignment and Power Allocation

Secure communication is a promising technology for wireless networks because it ensures secure transmission of information. In this paper, we investigate the joint subcarrier (SC) assignment and power allocation problem for nonorthogonal multiple access (NOMA) amplify-and-forward twoway relay wireless networks, in the presence of eavesdroppers. By exploiting cooperative jamming (CJ) to enhance ...

متن کامل

Aspect-Oriented Secure Connectors for Implementation of Secure Software Architecture

This paper describes aspect-oriented secure connectors for implementing secure software architecture for distributed business applications. A secure connector for secure software architecture can be designed separately from application business components by considering different communication patterns between the components as well as security services required by application components. In th...

متن کامل

A Multilevel Secure Object- Oriented Data Model

Recently, several security models have appeared in the literature dealing with mandatory access controls in object-oriented databases. While some of them are of considerable interest and merit (see the later section " Review of relevant research " for a discussion), they seem to lack intuitive appeal because they do not appear to model security in a way that takes full advantage of the object-o...

متن کامل

SODA: A secure object-oriented database system

This paper describes a security model for object-oriented systems. The model supports a flexible data classification policy based on inheritance. The classification policy allows for a smooth transition bctwccn rigid classification rules and unlimited polyinstantiation. The security model treats the data model as well as the computational model of object-oriented systems allowing more flexibili...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Communications

سال: 2020

ISSN: 0090-6778,1558-0857

DOI: 10.1109/tcomm.2020.3002268