Yalda Khosroshahi

Congratulations!  You have been automatically subscribed to IEEE DataPort and can access all datasets on IEEE DataPort!
First Name: 
Last Name: 

Datasets & Analysis

By introducing high randomness with reduced computational cost, physical layer (PHY) key generation is one of the candidate tools which can be used for the security of the Internet of Things (IoT) applications. Non-identical secret keys are one of the main problems of the physical layer (PHY) key generation schemes. In order to address this problem, key verification schemes which are based on information reconciliation are used.

  • Communications
  • Last Updated On: 
    Fri, 11/01/2019 - 12:14