Sign in

Everlasting Secrecy by Exploiting Non-Idealities of the Eavesdropper's Receiver.

Azadeh SheikholeslamiDennis GoeckelHossein Pishro-Nik
Published in: IEEE J. Sel. Areas Commun. (2013)
Keyphrases
  • neural network
  • genetic algorithm
  • expert systems
  • database
  • data mining
  • image processing
  • key management
  • security analysis