Secure Repairable Fountain Codes.
Siddhartha KumarEirik RosnesAlexandre Graell i AmatPublished in: IEEE Commun. Lett. (2016)
Keyphrases
- error correction
- reliability analysis
- group communication
- security requirements
- security analysis
- security protocols
- scalar product
- learning algorithm
- key exchange protocol
- data encryption
- stream cipher
- security management
- authentication scheme
- cryptographic protocols
- security issues
- operating system
- lightweight
- image compression
- information systems