Login / Signup
Exploiting Fountain Codes for Secure Wireless Delivery.
Hao Niu
Masayuki Iwai
Kaoru Sezaki
Li Sun
Qinghe Du
Published in:
IEEE Commun. Lett. (2014)
Keyphrases
</>
wireless networks
wireless communication
mobile devices
mobile communication
security analysis
security requirements
wireless medium
cellular networks
communication technologies
mobile networks
lightweight
security mechanisms
key management
error correction
mobile users
key distribution
network connectivity