Login / Signup
Secure Communication with a Proactive Eavesdropper Under Perfect CSI and CDI.
Qun Li
Ding Xu
Published in:
ChinaCom (1) (2019)
Keyphrases
</>
secure communication
smart card
secret key
secret sharing
public key
ad hoc networks
key management
computing environments
network security
digital signature
security protocols
chaotic systems
key technologies
multi party
resource sharing
secret sharing scheme
cryptographic protocols
distributed systems