• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

How to make a linear network code (strongly) secure.

Kaoru KurosawaHiroyuki OhtaKenji Kakuta
Published in: Des. Codes Cryptogr. (2017)
Keyphrases
  • source code
  • data flow
  • security analysis
  • wireless sensor networks
  • peer to peer
  • network structure
  • user authentication
  • complex networks
  • network traffic
  • network architecture
  • network resources