Login / Signup
Secrecy in an IoT System with Correlated and Non-identical Eavesdroppers.
Xian Liu
Published in:
LATINCOM (2021)
Keyphrases
</>
key management
management system
location information
security analysis
independent and identically distributed
cloud computing
highly correlated
spread spectrum
information retrieval
case study
resource constrained
key distribution