Login / Signup
Corrections to "Secure Network Code for Adaptive and Active Attacks With No-Randomness in Intermediate Nodes".
Ning Cai
Masahito Hayashi
Published in:
IEEE Trans. Inf. Theory (2020)
Keyphrases
</>
intermediate nodes
black hole
security mechanisms
network coding
source node
peer to peer
routing protocol
computer networks
mobile ad hoc networks
security protocols
packet forwarding
communication networks
wireless sensor networks
response time
wireless networks
mobile nodes