Research Directions in Wireless Security Iris

Abstract

We consider the problem of generating a shared secret key S between two parties over wireless channels, in the presence of an eavesdropping adversary. We focus on information theoretic approaches that, in contrast to existing cryptographic solutions, aim to solve this problem without making any assumptions about the adversary’s computational capabilities… (More)

Topics

2 Figures and Tables

Slides referencing similar topics