Polar-code-based security on the BSC-modeled HARQ in fading.
Yannis FountzoulasAngela KostaGeorge N. KarystinosPublished in: ICT (2016)
Keyphrases
- information security
- security systems
- access control
- network security
- security problems
- source code
- windows xp
- security policies
- functional requirements
- protection scheme
- security requirements
- security issues
- sensitive data
- information systems
- statistical databases
- rotation invariant
- security measures
- intrusion detection
- security analysis
- security protocols
- cyber security
- security level
- security threats
- polar coordinates
- fourier analysis
- computer networks
- information assurance