Login / Signup

A physical-layer authentication scheme based on hash method.

Jing YangXinsheng JiKaizhi HuangYajun ChenXiaohui Qi
Published in: ICCC Workshops (2015)
Keyphrases
  • distributed environment
  • authentication scheme