%PDF-1.5
%
1 0 obj
<>
endobj
2 0 obj
<>
endobj
3 0 obj
<>stream
IEEE
2016 IEEE Wireless Communications and Networking Conference;2016; ; ;10.1109/WCNC.2016.7564987
Cross MAC/PHY layer security design using ARQ with MRC and adaptive modulation
Jehad M. Hamamreh
Marwan Yusuf
Tuncer Baykas
Huseyin Arslan
endstream
endobj
4 0 obj
<>stream
x+ |
endstream
endobj
5 0 obj
<>stream
x=o0E+X$:@5$r__S\=i3gRx_(E6\Go!^ӴqL&ڝiC
gX˯R]d<|>stream
x+ |
endstream
endobj
7 0 obj
<>stream
x=o0E+R#PEk$*/N1]9х4-D
/!snjzX `8&R ubkzb6무}Ὃr4jPBP*{ˀkF+d sY\@;/\SvtY?
endstream
endobj
8 0 obj
<>stream
x+ |
endstream
endobj
9 0 obj
<>stream
xn0Ewl%:P&[i30
j$8U_|}Musut+=)<("+7On:Xn `8&Rab㎓t<>4]ᫍr4\PoUZ뺮qx;6f-óZ7mU4?
endstream
endobj
10 0 obj
<>stream
x+ |
endstream
endobj
11 0 obj
<>stream
xn0Ew
6JV5$
S\-]hehv`D
oR4yYlǭ1m>=I*cjqt؎q{! rN.&9 \IP~ty)Hu]8N-/S6fܵЎtU?
endstream
endobj
12 0 obj
<>stream
x+ |
endstream
endobj
13 0 obj
<>stream
x=o0E+X$:P5$r__S\=i3gRx_("O_״qL&ڝiC
gXYTîr2j>B>
g/6UU[&L꾷#}J7Y?
endstream
endobj
14 0 obj
<>stream
x+ |
endstream
endobj
15 0 obj
<>stream
xn0Ew 'dmTFb
9~vZ_ri~%W!DzVix3,ƅc0G qbk:>YiTgl