Login / Signup
Strategies of network coding against nodes conspiracy attack.
Rong Du
Chenglin Zhao
Feng Zhao
Shenghong Li
Published in:
Secur. Commun. Networks (2015)
Keyphrases
</>
network coding
intermediate nodes
wireless networks
routing algorithm
network layer
shortest path
network topology
multiple description coding
network structure
network bandwidth
web services
image compression
user experience
packet size