Login / Signup
Secure transmission using an untrusted relay with scaled compute-and-forward.
Zhijie Ren
Jasper Goseling
Jos H. Weber
Michael Gastpar
Published in:
ITW (2015)
Keyphrases
</>
sensitive data
third party
data transmission
key management
base station
security issues
neural network
smart card
personal information
multi hop
security analysis
security protocols
forward and backward
authentication scheme
identity management