On Optimizing the Security-Throughput Trade-Off in Wireless Networks With Adversaries

Lecture Notes in Computer Science - Germany
doi 10.1007/11767480_31
Full Text
Abstract

Available in full text

Date
Authors
Publisher

Springer Berlin Heidelberg