Login / Signup
Security analysis of hamming codes in relay aided networks.
Mehmet Ozgun Demir
Gunes Karabulut Kurt
Guido Dartmann
Gerd Ascheid
Ali Emre Pusane
Published in:
SIU (2018)
Keyphrases
</>
security analysis
smart card
public key
security requirements
error correction
authentication protocol
user authentication
high security
social networks
mutual authentication
encryption scheme
databases
image encryption
proxy signature scheme