Login / Signup
Stealthy keyless secret key generation from degraded sources.
Pin-Hsun Lin
Carsten Rudolf Janda
Eduard A. Jorswieck
Rafael F. Schaefer
Published in:
ACSSC (2017)
Keyphrases
</>
information sources
databases
data mining
search algorithm
data sources
multi source
real time
neural network
genetic algorithm
information systems
decision trees
bayesian networks
heterogeneous data sources
degraded images