Cooperative beamforming and jammer selection strategies for two-hop secure communication.
Hao DengHuiming WangChaowen LiuTong-Xing ZhengWenjie WangPublished in: ChinaCom (2015)
Keyphrases
- selection strategies
- secure communication
- selection strategy
- smart card
- secret key
- secret sharing
- ad hoc networks
- security protocols
- digital signature
- key management
- public key
- search strategies
- network security
- key technologies
- resource sharing
- chaotic systems
- secret sharing scheme
- frequency domain
- computing environments
- energy consumption