Physical layer security perspective resource allocation for D2D underlay communications against multiple eavesdroppers
Crossref DOI link: https://doi.org/10.1007/s11276-025-03986-4
Published Online: 2025-06-10
Published Print: 2025-08
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Liang, Yao-Jen https://orcid.org/0000-0002-2706-4958
Text and Data Mining valid from 2025-06-10
Version of Record valid from 2025-06-10
Article History
Accepted: 26 May 2025
First Online: 10 June 2025