Login / Signup
Cooperative jamming with untrusted SUs for secure communication of two-hop primary system.
Dawei Wang
Pinyi Ren
Yichen Wang
Qinghe Du
Li Sun
Published in:
IWCMC (2015)
Keyphrases
</>
secure communication
smart card
secret key
secret sharing
public key
key management
ad hoc networks
security protocols
privacy preserving
digital signature
chaotic systems
network security
key technologies
computer networks
computing environments
elliptic curve