Login / Signup
Encryption scheme against eavesdropper collusion in wireless multi-user network.
Ying Huang
Jing Lei
Wei Li
Published in:
IET Commun. (2020)
Keyphrases
</>
multi user
encryption scheme
virtual world
virtual environment
multi granularity
multiple access
augmented reality
user interface
single user
wireless mesh networks
mobile devices
wireless networks
software engineering
public key
multiple users
standard model
peer to peer
low cost
wireless communication
ciphertext
database applications
databases
multiscale