Login / Signup
Efficient wireless security through jamming, coding and routing.
Majid Ghaderi
Dennis Goeckel
Ariel Orda
Mostafa Dehghan
Published in:
SECON (2013)
Keyphrases
</>
network topology
coding scheme
ad hoc networks
network security
cloud computing
intrusion detection
privacy preserving
end to end
wireless communication
mobile ad hoc networks