Login / Signup

On the Effective Capacity of an Underwater Acoustic Channel under Impersonation Attack.

Waqas AmanZeeshan HaiderSyed Waqas Haider ShahMuhammad Mahboob Ur RahmanOctavia A. Dobre
Published in: ICC (2020)
Keyphrases
  • underwater acoustic
  • security analysis
  • data sets
  • sensor networks
  • authentication protocol