Login / Signup
Everlasting Secrecy by Exploiting Non-Idealities of the Eavesdropper's Receiver
Azadeh Sheikholeslami
Dennis Goeckel
Hossein Pishro-Nik
Published in:
CoRR (2012)
Keyphrases
</>
computer vision
databases
neural network
search engine
decision making
image processing
real world
database systems
artificial neural networks
key management
security analysis
physical layer
code division multiple access