Login / Signup
Secure Communication with a SWIPT-based Energy Harvesting Eavesdropper.
Qun Li
Ding Xu
Published in:
ICCC (2019)
Keyphrases
</>
secure communication
smart card
secret key
secret sharing
public key
energy consumption
ad hoc networks
key management
security protocols
network security
digital signature
chaotic systems
key technologies
computing environments
low cost
resource sharing
secret sharing scheme
peer to peer