Login / Signup
Relay Selection for Secure Successive AF Relaying Networks With Untrusted Nodes.
Wei Wang
Kah Chan Teh
Kwok Hung Li
Published in:
IEEE Trans. Inf. Forensics Secur. (2016)
Keyphrases
</>
network structure
sensitive data
mobile nodes
third party
mobile ad hoc networks
social networks
computer networks
wireless ad hoc networks
privacy preserving
multi agent
response time
shortest path
end to end
signal to noise ratio
network topology
relay nodes