1 code implementation • 21 Nov 2018 • Andrea Tassi, Robert J. Piechocki, Andrew Nix
This paper considers a network where a node wishes to transmit a source message to a legitimate receiver in the presence of an eavesdropper.
Information Theory Information Theory