• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Secret key generation based on private pilot under man-in-the-middle attack.

Yu HuangLiang JinNa LiZhou ZhongXiaoming Xu
Published in: Sci. China Inf. Sci. (2017)
Keyphrases
  • privacy preserving
  • private data
  • secret information
  • public private
  • computational complexity
  • secret key