Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Journal Article
%1 journals/corr/AmirKE16
%A Amir, Mohamed
%A Khattab, Tamer
%A El-Fouly, Tarek M.
%D 2016
%J CoRR
%K dblp
%T On the Secure Degrees of Freedom of the K-user MAC and 2-user Interference Channels.
%U http://dblp.uni-trier.de/db/journals/corr/corr1603.html#AmirKE16
%V abs/1603.09376
@article{journals/corr/AmirKE16,
added-at = {2016-07-13T00:00:00.000+0200},
author = {Amir, Mohamed and Khattab, Tamer and El-Fouly, Tarek M.},
biburl = {https://www.bibsonomy.org/bibtex/2f7de67cfa1f56e8bb91c6ec4ce7e410f/dblp},
ee = {http://arxiv.org/abs/1603.09376},
interhash = {61665134c88780f7516c5fcd8dc3f49b},
intrahash = {f7de67cfa1f56e8bb91c6ec4ce7e410f},
journal = {CoRR},
keywords = {dblp},
timestamp = {2016-07-14T11:37:04.000+0200},
title = {On the Secure Degrees of Freedom of the K-user MAC and 2-user Interference Channels.},
url = {http://dblp.uni-trier.de/db/journals/corr/corr1603.html#AmirKE16},
volume = {abs/1603.09376},
year = 2016
}