Login / Signup
A Secure Communication Game with a Relay Helping the Eavesdropper
Melda Yuksel
Xi Liu
Elza Erkip
Published in:
CoRR (2009)
Keyphrases
</>
secure communication
smart card
secret sharing
secret key
key management
public key
security protocols
digital signature
chaotic systems
ad hoc networks
network security
key technologies
computing environments
access control
resource sharing
fault tolerant
cryptographic protocols
image reconstruction