Login / Signup

Secret key generation based on private pilot under man-in-the-middle attack.

Yu HuangLiang JinNa LiZhou ZhongXiaoming Xu
Published in: Sci. China Inf. Sci. (2017)
Keyphrases
  • privacy preserving
  • private data
  • secret information
  • public private
  • computational complexity
  • secret key