Login / Signup
Role of Shared Key for Secure Communication Over 2-User Gaussian Z-Interference Channel.
Uppalapati Somalatha
Parthajit Mohapatra
Published in:
IEEE Trans. Inf. Forensics Secur. (2022)
Keyphrases
</>
wavelet transform
secure communication
smart card
secret key
key management
network security
digital signature
ad hoc networks
public key
security protocols
secret sharing
response time
image quality
computing environments
key technologies
chaotic systems