Login / Signup
Secure Network Code for Adaptive and Active Attacks with No-Randomness in Intermediate Nodes.
Ning Cai
Masahito Hayashi
Published in:
CoRR (2017)
Keyphrases
</>
intermediate nodes
routing protocol
black hole
network coding
security protocols
security mechanisms
source node
wireless sensor networks
communication networks
peer to peer
network traffic
response time
ad hoc networks
mobile nodes