Login / Signup
Secure Network Code for Adaptive and Active Attacks With No-Randomness in Intermediate Nodes.
Ning Cai
Masahito Hayashi
Published in:
IEEE Trans. Inf. Theory (2020)
Keyphrases
</>
intermediate nodes
security mechanisms
black hole
routing protocol
security protocols
wireless sensor networks
network structure
network topology
peer to peer
wireless networks
network coding
video streams
mobile ad hoc networks
multi hop