Login / Signup
Verification of Various Attack Approaches Against CSI-Based Secret Key in Different Types of LOS Channels.
Michal Pilc
Jedrzej Stanczak
Published in:
WICON (2014)
Keyphrases
</>
secret key
smart card
pseudorandom
authentication scheme
metadata
learning objects
key management
public key
encryption decryption
real time
data sets
hash functions
encryption scheme
secure communication
stream cipher