Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2893594
Abstract: When the eavesdropping channel has a certain correlation with the legitimate channel, the physical layer key is susceptible to eavesdroppers. To ensure the security of the secret key, we propose a two-layer secure (TLS) quantization…
read more here.
Keywords:
key;
layer;
algorithm;
quantization algorithm ... See more keywords