ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2001.07162
  4. Cited By
Authenticated Secret Key Generation in Delay Constrained Wireless
  Systems
v1v2 (latest)

Authenticated Secret Key Generation in Delay Constrained Wireless Systems

20 January 2020
Miroslav Mitev
A. Chorti
M. Reed
Leila Musavian
ArXiv (abs)PDFHTML

Papers citing "Authenticated Secret Key Generation in Delay Constrained Wireless Systems"

10 / 10 papers shown
Title
Joint secure communication and sensing in 6G networks
Joint secure communication and sensing in 6G networks
Miroslav Mitev
Amitha Mayya
A. Chorti
134
2
0
23 Oct 2023
A SKG Security Challenge: Indoor SKG Under an On-The-Shoulder
  Eavesdropping Attack
A SKG Security Challenge: Indoor SKG Under an On-The-Shoulder Eavesdropping Attack
Amitha Mayya
Miroslav Mitev
A. Chorti
G. Fettweis
86
5
0
16 May 2023
Physical Layer Secret Key Generation with Kalman Filter Detrending
Physical Layer Secret Key Generation with Kalman Filter Detrending
Miroslav Mitev
A. Chorti
G. Fettweis
63
1
0
08 May 2023
What Physical Layer Security Can Do for 6G Security
What Physical Layer Security Can Do for 6G Security
Miroslav Mitev
A. Chorti
H. Vincent Poor
G. Fettweis
51
90
0
01 Dec 2022
Physical Layer Security -- from Theory to Practice
Physical Layer Security -- from Theory to Practice
Miroslav Mitev
Thuy M. Pham
A. Chorti
A. Barreto
G. Fettweis
65
9
0
24 Oct 2022
Smart Channel State Information Pre-processing for Joint Authentication
  and Secret Key Distillation
Smart Channel State Information Pre-processing for Joint Authentication and Secret Key Distillation
M. Srinivasan
Sotiris Skaperas
A. Chorti
Mahdi Shakiba-Herfeh
M. K. Shehzad
P. Sehier
51
1
0
01 Jun 2022
Physical Layer Security for 6G Systems why it is needed and how to make
  it happen
Physical Layer Security for 6G Systems why it is needed and how to make it happen
A. Chorti
42
0
0
03 May 2022
On the Use of CSI for the Generation of RF Fingerprints and Secret Keys
On the Use of CSI for the Generation of RF Fingerprints and Secret Keys
M. Srinivasan
Sotiris Skaperas
A. Chorti
51
9
0
28 Oct 2021
Context-Aware Security for 6G Wireless The Role of Physical Layer
  Security
Context-Aware Security for 6G Wireless The Role of Physical Layer Security
A. Chorti
A. Barreto
Stefan Kopsell
M. Zoli
Marwa Chafii
P. Sehier
G. Fettweis
H. Vincent Poor
113
127
0
05 Jan 2021
Multi-factor Physical Layer Security Authentication in Short Blocklength
  Communication
Multi-factor Physical Layer Security Authentication in Short Blocklength Communication
Miroslav Mitev
Mahdi Shakiba-Herfeh
A. Chorti
M. Reed
77
20
0
27 Oct 2020
1