Login / Signup
Information Theoretically Secure Encryption Key Generation over Wireless Networks by Exploiting Packet Errors.
Amir K. Khandani
Published in:
CoRR (2024)
Keyphrases
</>
wireless networks
mobile computing
response time
ad hoc networks