Login / Signup

How to make a linear network code (strongly) secure.

Kaoru KurosawaHiroyuki OhtaKenji Kakuta
Published in: Des. Codes Cryptogr. (2017)
Keyphrases
  • source code
  • data flow
  • security analysis
  • wireless sensor networks
  • peer to peer
  • network structure
  • user authentication
  • complex networks
  • network traffic
  • network architecture
  • network resources