Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2020.2974621
Abstract: Two legitimate parties, referred to as Alice and Bob, wish to generate secret keys from the wireless channel in the presence of an eavesdropper, referred to as Eve, in order to use such keys for…
read more here.
Keywords:
key generation;
static environments;
alice bob;
secret key ... See more keywords