Login / Signup

UAV Trajectory Optimization for PHY Secure Communication Against Cooperative Eavesdroppers.

Huanran ZhangLingfeng ShenNing WangXiaomin Mu
Published in: CyberC (2022)
Keyphrases
  • secure communication
  • optimization algorithm
  • smart card
  • secret sharing
  • secret key
  • public key
  • digital signature
  • key management
  • web services
  • anomaly detection
  • multi party
  • secret sharing scheme