Sign in

On secure computation over the binary modulo-2 adder multiple-access wiretap channel.

Mario GoldenbaumHolger BocheH. Vincent Poor
Published in: ITW (2016)
Keyphrases
  • multiple access
  • communication systems
  • wireless communication
  • multi user
  • division multiple access
  • frequency hopping
  • wireless networks
  • data flow
  • peer to peer
  • computer simulation