Login / Signup
Imperfect secrecy in wiretap channel II.
Fan Cheng
Raymond W. Yeung
Kenneth W. Shum
Published in:
ISIT (2012)
Keyphrases
</>
multi channel
multiple access
data mining
artificial intelligence
computer simulation
partial information
security analysis