Login / Signup
Using Perfect Codes in Relay Aided Networks: A Security Analysis.
Mehmet Özgün Demir
Ozan Alp Topal
Guido Dartmann
Anke Schmeink
Gerd Ascheid
Günes Kurt
Ali Emre Pusane
Published in:
WiMob (2019)
Keyphrases
</>
security analysis
public key
smart card
security requirements
security properties
high security
encryption scheme
authentication protocol
error correction
user authentication
mutual authentication
social networks
information systems
image compression
encryption algorithm
image encryption