On Mixing Authenticated and Non-Authenticated Signals Against GNSS Spoofing.
Francesco ArdizzonLaura CrosaraStefano TomasinNicola LaurentiPublished in: IEEE Trans. Inf. Forensics Secur. (2024)
Keyphrases
- key exchange protocol
- key exchange
- authentication scheme
- signal processing
- key agreement protocol
- real time
- navigation systems
- password based authenticated key exchange
- artificial intelligence
- computer vision
- blind source separation
- key distribution
- data processing
- website
- search engine
- genetic algorithm
- information retrieval