Login / Signup

Information Theoretically Secure Encryption Key Generation over Wireless Networks by Exploiting Packet Errors.

Amir K. Khandani
Published in: CoRR (2024)
Keyphrases
  • wireless networks
  • mobile computing
  • response time
  • ad hoc networks