Login / Signup
Wireless Secret Sharing Game between Two Legitimate Users and an Eavesdropper.
Lei Miao
Dingde Jiang
Published in:
CoRR (2020)
Keyphrases
</>
secret sharing
secret sharing scheme
wireless networks
mobile devices
co occurrence
visual cryptography scheme
preprocessing
wavelet transform
sensor networks
power consumption