ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1107.3534
  4. Cited By
Exploiting Channel Diversity in Secret Key Generation from Multipath
  Fading Randomness
v1v2 (latest)

Exploiting Channel Diversity in Secret Key Generation from Multipath Fading Randomness

IEEE Transactions on Information Forensics and Security (IEEE TIFS), 2011
18 July 2011
Yanpei Liu
S. Draper
A. Sayeed
ArXiv (abs)PDFHTML

Papers citing "Exploiting Channel Diversity in Secret Key Generation from Multipath Fading Randomness"

11 / 11 papers shown
Let's shake on it: Extracting secure shared keys from Wi-Fi CSI
Let's shake on it: Extracting secure shared keys from Wi-Fi CSIIEEE International Conference on Mobile Adhoc and Sensor Systems (MASS), 2023
Tomer Avrahami
O. Amrani
A. Wool
66
1
0
11 Jul 2023
Secret-Free Device Pairing in the mmWave Band
Secret-Free Device Pairing in the mmWave Band
Ziqi Xu
Jingcheng Li
Yanjun Pan
Ming Li
Loukas Lazos
79
0
0
29 Jun 2023
Securing IoT Communication using Physical Sensor Data -- Graph Layer
  Security with Federated Multi-Agent Deep Reinforcement Learning
Securing IoT Communication using Physical Sensor Data -- Graph Layer Security with Federated Multi-Agent Deep Reinforcement LearningIEEE International Conference on Signal and Image Processing (ICSIP), 2023
Liang Wang
Zhuangkun Wei
Weisi Guo
98
2
0
24 Feb 2023
Joint Precoding and Phase Shift Design in Reconfigurable Intelligent
  Surfaces-Assisted Secret Key Generation
Joint Precoding and Phase Shift Design in Reconfigurable Intelligent Surfaces-Assisted Secret Key GenerationIEEE Transactions on Information Forensics and Security (IEEE TIFS), 2022
Tianyu Lu
Liquan Chen
Junqing Zhang
Chen Chen
A. Hu
226
19
0
30 Jul 2022
Statistical Inference Attack Against PHY-layer Key Extraction and
  Countermeasures
Statistical Inference Attack Against PHY-layer Key Extraction and Countermeasures
R. Zhu
Tao Shu
Huirong Fu
AAML
214
3
0
29 Sep 2018
Survey and Systematization of Secure Device Pairing
Survey and Systematization of Secure Device Pairing
Mikhail Fomichev
Flor Álvarez
Daniel Steinmetzer
Paul Gardner-Stephen
M. Hollick
211
66
0
08 Sep 2017
The Passive Eavesdropper Affects my Channel: Secret-Key Rates under
  Real-World Conditions (Extended Version)
The Passive Eavesdropper Affects my Channel: Secret-Key Rates under Real-World Conditions (Extended Version)
Christian T. Zenger
Hendrik Vogt
J. Zimmer
Aydin Sezgin
C. Paar
200
31
0
14 Jan 2017
Secret Key Agreement with Large Antenna Arrays under the Pilot
  Contamination Attack
Secret Key Agreement with Large Antenna Arrays under the Pilot Contamination Attack
Sanghun Im
Hyoungsuk Jeon
Jinho Choi
J. Ha
185
31
0
01 Jul 2015
Full-Duplex vs. Half-Duplex Secret-Key Generation
Full-Duplex vs. Half-Duplex Secret-Key Generation
Hendrik Vogt
Zohaib Hassan Awan
Aydin Sezgin
132
8
0
29 Jun 2015
Low-power Secret-key Agreement over OFDM
Low-power Secret-key Agreement over OFDM
F. Renna
Nicola Laurenti
Stefano Tomasin
Marco Baldi
N. Maturo
Marco Bianchi
F. Chiaraluce
Matthieu R. Bloch
203
8
0
19 Feb 2013
Efficient and Secure Key Extraction using CSI without Chasing down
  Errors
Efficient and Secure Key Extraction using CSI without Chasing down Errors
Jizhong Zhao
Wei Xi
Jinsong Han
Shaojie Tang
Xiangyang Li
Yunhao Liu
Yihong Gong
Zehua Zhou
148
8
0
03 Aug 2012
1
Page 1 of 1