Linked e-resources

Details

A Study of Injection and Jamming Attacks in Wireless Secret Sharing Systems
Robust Secret Sharing for End-to-End Key Establishment with Physical Layer Keys under Active Attacks
Semantically-Secured Message-Key Trade-off over Wiretap Channels with Random Parameters
Hash-then-Encode: A Modular Semantically Secure Wiretap Code
A CCA-Secure Cryptosystem Using Massive MIMO Channels
You Are How You Play: Authenticating Mobile Users via Game Playing
Fuzzy Authentication using Rank Distance
A McEliece-based Key Exchange Protocol for Optical Communication Systems
An ICN-based Authentication Protocol for a Simplified LTE Architecture.

Browse Subjects

Show more subjects...

Statistics

from
to
Export