Login / Signup
On the Use of CSI for the Generation of RF Fingerprints and Secret Keys.
Muralikrishnan Srinivasan
Sotiris Skaperas
Arsenia Chorti
Published in:
CoRR (2021)
Keyphrases
</>
secret key
authentication scheme
smart card
secure communication
pseudorandom
encryption scheme
radio frequency
key distribution
relevance feedback
signature scheme
public key
data sets
data points
low cost
ciphertext