بحث بسيط
السجلات المعروضة 1 -- 5 من 5
Channel secondary random process for robust secret key generation
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
The broadcast nature of wireless communications imposes the risk of information leakage to adversarial users or unauthorized receivers. Therefore, information security between intended users remains a challenging issue. ...
Secret key generation based on AoA estimation for low SNR conditions
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
In the context of physical layer security, a physical layer characteristic is used as a common source of randomness to generate the secret key. Therefore an accurate estimation of this characteristic is the core for reliable ...
Comparative simulation for physical layer key generation methods
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
The paper cogitates about a comparative simulation for various distillation, reconciliation, and privacy amplification techniques that are used to generate secure symmetric physical layer keys. Elementary wireless model ...
Optical mode division multiplexing for secure Ro-FSO WLANs
(
American Scientific Publishers
, 2015 , Article)
The widespread deployment of various wireless radio access systems in public areas poses acute issues in frequency assignment. Radio-over-free-space-optics (Ro-FSO) technology enhances spectral efficiency and may pave the ...
Optical mode division multiplexing for secure Ro-FSO WLANs
(
American Scientific Publishers
, 2015 , Article)
The widespread deployment of various wireless radio access systems in public areas poses acute issues in frequency assignment. Radio-over-free-space-optics (Ro-FSO) technology enhances spectral efficiency and may pave the ...