Search
Now showing items 1-2 of 2
Channel secondary random process for robust secret key generation
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
The broadcast nature of wireless communications imposes the risk of information leakage to adversarial users or unauthorized receivers. Therefore, information security between intended users remains a challenging issue. ...
Comparative simulation for physical layer key generation methods
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
The paper cogitates about a comparative simulation for various distillation, reconciliation, and privacy amplification techniques that are used to generate secure symmetric physical layer keys. Elementary wireless model ...