Login / Signup
Identity-based proof of retrievability meets with identity-based network coding.
Yixin Chen
Jinyong Chang
Published in:
Clust. Comput. (2022)
Keyphrases
</>
network coding
signature scheme
key management
wireless networks
neural network
multiresolution
wavelet transform
routing algorithm
network bandwidth