Login / Signup

Imperfect secrecy in wiretap channel II.

Fan ChengRaymond W. YeungKenneth W. Shum
Published in: ISIT (2012)
Keyphrases
  • multi channel
  • multiple access
  • data mining
  • artificial intelligence
  • computer simulation
  • partial information
  • security analysis