Login / Signup
Beating resource constrained eavesdroppers: A physical layer security study.
Albert Sunny
Siddhartha Sarma
Joy Kuri
Published in:
WiOpt (2015)
Keyphrases
</>
resource constrained
physical layer
key management
sensor networks
application layer
intrusion detection
information security
resource constraints