Login / Signup
Securing Untrusted Full-Duplex Relay Channels in the Presence of Multiple External Cluster-Based Eavesdroppers.
Ahmed El Shafie
Asma Mabrouk
Kamel Tourki
Naofal Al-Dhahir
Mazen O. Hasna
Published in:
CoRR (2018)
Keyphrases
</>
third party
databases
real world
computer simulation
internal and external
artificial intelligence
expert systems
data management
image pairs
multi channel
security policies