Login / Signup
Secure Transmission with Covert Requirement in Untrusted Relaying Networks.
Moslem Forouzesh
Paeiz Azmi
Ali Kuhestani
Published in:
IST (2018)
Keyphrases
</>
network analysis
social networks
key players
lightweight
terrorist networks
sensitive data
third party
network structure
heterogeneous networks
privacy preserving
smart card
information flow
data transmission
network design
security requirements
transmission line
power system