Login / Signup

Arbitrary jamming can preclude secure communication.

Ebrahim MolavianJaziMatthieu R. BlochJ. Nicholas Laneman
Published in: Allerton (2009)
Keyphrases
  • secure communication
  • smart card
  • secret key
  • secret sharing
  • public key
  • key management
  • network security
  • security protocols
  • ad hoc networks
  • chaotic systems
  • digital signature
  • computing environments
  • resource sharing