Login / Signup
Secure performance analysis of cognitive two-way relay system with an eavesdropper.
Qi Gu
Gongpu Wang
Rongfei Fan
Zhangdui Zhong
Published in:
ICCC (2014)
Keyphrases
</>
information processing
security requirements
cognitive processes
security issues
security mechanisms
computational models
cryptographic protocols
data sets
end to end
mental models
key management
cognitive process
key exchange
technical systems