Login / Signup
Buffer-Aided Relaying for Two-Hop Secure Communication.
Jing Huang
A. Lee Swindlehurst
Published in:
IEEE Trans. Wirel. Commun. (2015)
Keyphrases
</>
secure communication
smart card
secret key
secret sharing
public key
ad hoc networks
digital signature
key management
security protocols
network security
key technologies
chaotic systems
secret sharing scheme
wireless sensor networks
low cost
end to end