Login / Signup
Secret Communication When the Eavesdropper Might Be an Active Adversary.
Andrey Garnaev
Wade Trappe
Published in:
MACOM (2014)
Keyphrases
</>
data sets
communication systems
human computer
information sharing
computer networks
communication technologies
databases
machine learning
data acquisition
communication cost
active databases
communication overhead
communication protocol
secret sharing