Search
Now showing items 1-2 of 2
Robust secret key extraction from channel secondary random process
(
John Wiley and Sons Ltd
, 2016 , Conference Paper)
The vast majority of existing secret key generation protocols exploit the inherent randomness of the wireless channel as a common source of randomness. However, independent noise added at the receivers of the legitimate ...
Band allocation for cognitive radios with buffered primary and secondary users
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
In this paper, we study band allocation of Ms buffered secondary users (SUs) to Mp orthogonal primary licensed bands, where each primary band is assigned to one primary user (PU). Each SU is assigned to one of the available ...