Login / Signup
Hamming Distortion Based Secrecy Systems: To Foil the Eavesdropper With Finite Shared Key.
Zhao Chen
Liuguo Yin
Jianhua Lu
Published in:
IEEE Commun. Lett. (2015)
Keyphrases
</>
management system
complex systems
distributed systems
distance measure
intelligent systems
computer systems
inductive logic programming
data sets
neural network
information retrieval
artificial intelligence
expert systems
building blocks
key technologies
rule learning