Login / Signup
Imitating Full-Duplex Secure Communication with Buffer-Aided Half-Duplex Relays.
Jiayu Zhou
Deli Qiao
Haifeng Qian
Published in:
ICC (2021)
Keyphrases
</>
secure communication
smart card
secret key
ad hoc networks
secret sharing
public key
security protocols
key management
wireless networks
network security
key technologies
chaotic systems
digital signature
computing environments
resource sharing
response time