Funder
Ministry of Education of China
Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference31 articles.
1. Secret key generation in mimo wireless systems using precoded channel measurements;BakÅi,2017
2. Protecting secret key generation systems against jamming: energy harvesting and channel hopping approaches;Belmega;IEEE Trans. Inf. Forensics Secur.,2017
3. Experimental channel-based secret key generation with integrated ultra wideband devices;Bulenok,2016
4. New publicly verifiable databases with efficient updates;Chen;IEEE Trans. Dependable Secure Comput.,2015
5. Verifiable computation over large database with incremental updates;Chen;IEEE Trans. Comput.,2016
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Highly Consistent and High-speed Physical Layer Key Generation Scheme;Wireless Personal Communications;2023-11
2. The key quantization method based on membership;Third International Conference on Signal Image Processing and Communication (ICSIPC 2023);2023-10-20
3. Secret Key Generation From Route Propagation Delays for Underwater Acoustic Networks;IEEE Transactions on Information Forensics and Security;2023
4. Topology-based Secret Key Generation for Underwater Acoustic Networks;2021 Fifth Underwater Communications and Networking Conference (UComms);2021-08-31
5. A Non-Time-Limited Channel Sounding Protocol for Key Generation;Wireless Personal Communications;2021-05-18