Sign in

Efficient wireless security through jamming, coding and routing.

Majid GhaderiDennis GoeckelAriel OrdaMostafa Dehghan
Published in: SECON (2013)
Keyphrases
  • network topology
  • coding scheme
  • ad hoc networks
  • network security
  • cloud computing
  • intrusion detection
  • privacy preserving
  • end to end
  • wireless communication
  • mobile ad hoc networks