Sign in

Identity-based proof of retrievability meets with identity-based network coding.

Yixin ChenJinyong Chang
Published in: Clust. Comput. (2022)
Keyphrases
  • network coding
  • signature scheme
  • key management
  • wireless networks
  • neural network
  • multiresolution
  • wavelet transform
  • routing algorithm
  • network bandwidth