Login / Signup
On secure computation over the binary modulo-2 adder multiple-access wiretap channel.
Mario Goldenbaum
Holger Boche
H. Vincent Poor
Published in:
ITW (2016)
Keyphrases
</>
multiple access
communication systems
wireless communication
multi user
division multiple access
frequency hopping
wireless networks
data flow
peer to peer
computer simulation