Browsing by Subject "Conventional techniques"
Now showing items 1-2 of 2
-
Channel secondary random process for robust secret key generation
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)The broadcast nature of wireless communications imposes the risk of information leakage to adversarial users or unauthorized receivers. Therefore, information security between intended users remains a challenging issue. ... -
Robust secret key extraction from channel secondary random process
( John Wiley and Sons Ltd , 2016 , Conference Paper)The vast majority of existing secret key generation protocols exploit the inherent randomness of the wireless channel as a common source of randomness. However, independent noise added at the receivers of the legitimate ...