Login / Signup

Custom-fit security for efficient and pollution-resistant multicast OTA-programming with fountain codes.

Oliver StecklinaStephan KornemannFelix GrehlRamona JungThorsten KranzGregor LeanderDennis SchweerKatharina MollusDirk Westhoff
Published in: I4CS (2015)
Keyphrases
  • intrusion detection
  • domain specific
  • genetic algorithm
  • end to end
  • error correction
  • security issues
  • provably secure