Sign in

Beating resource constrained eavesdroppers: A physical layer security study.

Albert SunnySiddhartha SarmaJoy Kuri
Published in: WiOpt (2015)
Keyphrases
  • resource constrained
  • physical layer
  • key management
  • sensor networks
  • application layer
  • intrusion detection
  • information security
  • resource constraints