窃听信道模型中的保密通信性能研究
此文系后续整理,各种图片公式懒得copy,需要可以直接下载作者相关作业、文章,附件:
https://download.youkuaiyun.com/download/weixin_40744915/10296110
https://download.youkuaiyun.com/download/weixin_40744915/10296115
https://download.youkuaiyun.com/download/weixin_40744915/10296107