Login / Signup
Everlasting Secrecy by Exploiting Non-Idealities of the Eavesdropper's Receiver.
Azadeh Sheikholeslami
Dennis Goeckel
Hossein Pishro-Nik
Published in:
IEEE J. Sel. Areas Commun. (2013)
Keyphrases
</>
neural network
genetic algorithm
expert systems
database
data mining
image processing
key management
security analysis