A Hybrid Key Generation and a Verification Scheme Dataset

By introducing high randomness with reduced computational cost, physical layer (PHY) key generation is one of the candidate tools which can be used for the security of the Internet of Things (IoT) applications. Non-identical secret keys are one of the main problems of the physical layer (PHY) key generation schemes. In order to address this problem, key verification schemes which are based on information reconciliation are used.

Dataset Files

You must be an IEEE Dataport Subscriber to access these files. Subscribe now or login.

[1] , "A Hybrid Key Generation and a Verification Scheme Dataset", IEEE Dataport, 2019. [Online]. Available: http://dx.doi.org/10.21227/x235-xh51. Accessed: Aug. 20, 2019.
@data{x235-xh51-19,
doi = {10.21227/x235-xh51},
url = {http://dx.doi.org/10.21227/x235-xh51},
author = { },
publisher = {IEEE Dataport},
title = {A Hybrid Key Generation and a Verification Scheme Dataset},
year = {2019} }
TY - DATA
T1 - A Hybrid Key Generation and a Verification Scheme Dataset
AU -
PY - 2019
PB - IEEE Dataport
UR - 10.21227/x235-xh51
ER -
. (2019). A Hybrid Key Generation and a Verification Scheme Dataset. IEEE Dataport. http://dx.doi.org/10.21227/x235-xh51
, 2019. A Hybrid Key Generation and a Verification Scheme Dataset. Available at: http://dx.doi.org/10.21227/x235-xh51.
. (2019). "A Hybrid Key Generation and a Verification Scheme Dataset." Web.
1. . A Hybrid Key Generation and a Verification Scheme Dataset [Internet]. IEEE Dataport; 2019. Available from : http://dx.doi.org/10.21227/x235-xh51
. "A Hybrid Key Generation and a Verification Scheme Dataset." doi: 10.21227/x235-xh51