Subject
Computer Science Applications,Information Systems,Signal Processing,Theoretical Computer Science
Reference9 articles.
1. Key exchange using ‘keyless cryptography’;Alpern;Inform. Process. Lett.,1983
2. Cryptography and Data Security;Denning,1982
3. Master keys for group sharing;Denning;Inform. Process. Lett.,1981
4. More on master keys for group sharing;Denning;Inform. Process. Lett.,1981
5. New directions in cryptography;Diffie;IEEE Trans. Information Theory IT-22,1976
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Index-Modulation-Based Key Exchange Scheme for Internet of Things Networks;IEEE Internet of Things Journal;2024-01-15
2. Communication Channel Anonymity;Encyclopedia of Cryptography, Security and Privacy;2022
3. KaFHCa: Key-establishment via Frequency Hopping Collisions;ICC 2021 - IEEE International Conference on Communications;2021-06
4. Jamming Strategies in Covert Communication;Lecture Notes in Computer Science;2019
5. Secret Key Sharing Protocol between Units Connected by Wireless MIMO Fading Channels;Proceedings of the 2018 Federated Conference on Computer Science and Information Systems;2018-09-26