Login / Signup
Secure transmission with covert requirement in untrusted relaying networks.
Moslem Forouzesh
Paeiz Azmi
Ali Kuhestani
Published in:
CoRR (2018)
Keyphrases
</>
network analysis
terrorist networks
key players
third party
sensitive data
social networks
network structure
network design
lightweight
social network analysis
community structure
data transmission
cryptographic protocols
privacy preserving
communication networks
heterogeneous networks