Login / Signup
An Encryption-Aware PHY Security Framework for 4-Node Gaussian Wiretap Channels With Joint Power Constraint.
Tarig Sadig
Mehdi Maleki
Nghi H. Tran
Hamid-Reza Bahrami
Published in:
IEEE Trans. Commun. (2020)
Keyphrases
</>
intrusion detection
security requirements
encryption algorithms
probabilistic model
sensor networks
software architecture
power consumption
information security
key management
encryption algorithm
image encryption
identity authentication