Login / Signup
Arbitrary jamming can preclude secure communication.
Ebrahim MolavianJazi
Matthieu R. Bloch
J. Nicholas Laneman
Published in:
Allerton (2009)
Keyphrases
</>
secure communication
smart card
secret key
secret sharing
public key
key management
network security
security protocols
ad hoc networks
chaotic systems
digital signature
computing environments
resource sharing