Empirical Bounds on the Rate of Secret Bits Extracted from Received Signal Strength

Symmetric cryptography relies on pairs of identical secret keys shared by the legitimate communicating parties. To implement a symmetric-key algorithm for cryptography, a major concern is to develop secure methods for distribution of the secret key. In securing the wireless fading channels by symmet...

Full description

Saved in:
Bibliographic Details
Published in:2019 53rd Annual Conference on Information Sciences and Systems (CISS) pp. 1 - 6
Main Authors: Azizi, Sima, Komaee, Arash
Format: Conference Proceeding
Language:English
Published: IEEE 01.03.2019
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first