Exploiting the non-commutativity of nonlinear operators for information-theoretic security in disadvantaged wireless environments | IEEE Conference Publication | IEEE Xplore