Login / Signup
Secure Communication Based on Fountain Code and Channel Feedback.
Dantong Huang
Li Sun
Published in:
WCSP (2019)
Keyphrases
</>
secure communication
smart card
secret key
public key
secret sharing
ad hoc networks
key management
digital signature
network security
security protocols
computing environments
resource sharing
chaotic systems
information security
key technologies
mobile agent system
motion estimation