Sign in
RIS Enabled Secure Communication with Covert Constraint.
Ufuk Altun
Ertugrul Basar
Published in:
ACSCC (2021)
Keyphrases
</>
secure communication
smart card
secret key
secret sharing
ad hoc networks
key management
security protocols
network security
digital signature
public key
resource sharing
computing environments
chaotic systems
databases
grid computing