Login / Signup
How to make a linear network code (strongly) secure.
Kaoru Kurosawa
Hiroyuki Ohta
Kenji Kakuta
Published in:
Des. Codes Cryptogr. (2017)
Keyphrases
</>
source code
data flow
security analysis
wireless sensor networks
peer to peer
network structure
user authentication
complex networks
network traffic
network architecture
network resources