Login / Signup
Secure communication using an untrusted relay via sources and channels.
Nebojsa Milosavljevic
Michael Gastpar
Kannan Ramchandran
Published in:
ISIT (2009)
Keyphrases
</>
secure communication
smart card
secret key
key management
public key
ad hoc networks
secret sharing
security protocols
digital signature
privacy preserving
computing environments
network security
key technologies
wireless sensor networks
digital images
security policies