Abstract
This paper considers the problem of transmitting digital data from a source reliably to a legitimate user, subjected to a wiretap at a receiver that e......
小提示:本篇文献需要登录阅读全文,点击跳转登录