Login / Signup
On secure communication with known interference.
Mustafa El-Halabi
Costas N. Georghiades
Published in:
ISITA (2012)
Keyphrases
</>
secure communication
smart card
public key
secret key
secret sharing
ad hoc networks
key management
network security
security protocols
digital signature
key technologies
computing environments
chaotic systems
wireless networks
multipath
resource sharing