1 |
K. Pongaliur and L. Xiao, "Maintaining source privacy under eavesdropping and node compromise attacks," in Proc. IEEE INFOCOM, pp. 1656-1664, Shanghai, China, Apr. 2011.
|
2 |
X. Zhou, R. K. Ganti, and J. G. Andrews, "Secure wireless network connectivity with multi-antenna transmission," IEEE Trans. Wireless Commun., vol. 10, no. 2, pp. 425-430, Feb. 2011.
DOI
ScienceOn
|
3 |
M. Kim and W. Lee, "Analysis of neighbor discovery process with directional antenna for IEEE 802.15.3c," J. KICS, vol. 37B, no. 1, pp. 9-14, Jan. 2012.
과학기술학회마을
DOI
ScienceOn
|
4 |
M. Kim, Y. S. Kim, and W. Lee, "Performance analysis of directional CSMA/CA for IEEE 802.15.3c under saturation environments," ETRI J., vol. 34, no. 1, pp. 24-34, Feb. 2012.
과학기술학회마을
DOI
|
5 |
M. Kim, S.-E. Hong, and J. Kim, "Analysis of directional communication via relaying devices in mmWave WPANs," IEEE Commun. Lett., vol. 16, no. 5, pp. 342-345, Mar. 2012.
DOI
ScienceOn
|