Login / Signup
Securing Optical Network Access with Post-switching Coding Scheme of Signatures Reconfiguration.
Jen-Fa Huang
Sheng-Hui Meng
Kai-Sheng Chen
Ying-Chen Lin
Published in:
AINA Workshops (2014)
Keyphrases
</>
coding scheme
network access
wireless networks
cloud computing
network security
bitstream
information security
security policies
virtual machine
coding method
transform coding
cognitive radio
computer networks
image transmission
multiresolution
motion vectors