Login / Signup
Achieving secure communication through pilot manipulation.
Morteza Soltani
Tuncer Baykas
Hüseyin Arslan
Published in:
PIMRC (2015)
Keyphrases
</>
secure communication
smart card
secret key
secret sharing
public key
ad hoc networks
key management
network security
security protocols
digital signature
chaotic systems
secret sharing scheme
key technologies
cloud computing