Linked e-resources
Details
Table of Contents
A Study of Injection and Jamming Attacks in Wireless Secret Sharing Systems
Robust Secret Sharing for End-to-End Key Establishment with Physical Layer Keys under Active Attacks
Semantically-Secured Message-Key Trade-off over Wiretap Channels with Random Parameters
Hash-then-Encode: A Modular Semantically Secure Wiretap Code
A CCA-Secure Cryptosystem Using Massive MIMO Channels
You Are How You Play: Authenticating Mobile Users via Game Playing
Fuzzy Authentication using Rank Distance
A McEliece-based Key Exchange Protocol for Optical Communication Systems
An ICN-based Authentication Protocol for a Simplified LTE Architecture.
Robust Secret Sharing for End-to-End Key Establishment with Physical Layer Keys under Active Attacks
Semantically-Secured Message-Key Trade-off over Wiretap Channels with Random Parameters
Hash-then-Encode: A Modular Semantically Secure Wiretap Code
A CCA-Secure Cryptosystem Using Massive MIMO Channels
You Are How You Play: Authenticating Mobile Users via Game Playing
Fuzzy Authentication using Rank Distance
A McEliece-based Key Exchange Protocol for Optical Communication Systems
An ICN-based Authentication Protocol for a Simplified LTE Architecture.