default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 1,484 matches
- 2024
- Muhammad Adil, Habib Ullah Khan, Mohammad Arif, Mian Shah Nawaz, Faheem Khan:
New Dimensions for Physical Layer Secret Key Generation: Excursion Lengths-Based Key Generation. IEEE Access 12: 82972-82983 (2024) - Amang Sudarsono, Rahardhita Widyatra Sudibyo, Idris Winarno, Mike Yuliana:
Ephemeral Secret Leakage-Free ID-Role-Based Access Control Authentication and Key Exchange Protocol for Securing Electric Vehicle Data. IEEE Access 12: 120961-120978 (2024) - Gang Pan, Chunyi Chen, Haifeng Yao, Xiaolong Ni, Xiaojuan Hu, Haiyang Yu, Qiong Li:
Shared secret key extraction from atmospheric optical wireless channels with multi-scale information reconciliation. Ad Hoc Networks 164: 103638 (2024) - Supriya Palekar, Y. Radhika:
APRO: Secret Key Based Data Encryption and Mutual Authentication with Privacy Preservation Model in IoT Using Autoregressive Poor and Rich Optimization. Cybern. Syst. 55(4): 823-847 (2024) - Zhimei Yang, Changgen Peng, Chongyi Zhong, Yangyang Long:
Consortium blockchain private key protection scheme based on rational secret sharing and blockchain. Comput. Networks 242: 110260 (2024) - Liquan Chen, Yaqing Zhu, Suhui Liu, Hongtao Yu, Bing Zhang:
PUF-based dynamic secret-key strategy with hierarchical blockchain for UAV swarm authentication. Comput. Commun. 218: 31-43 (2024) - Rourab Paul, Nimisha Ghosh, Amrutanshu Panigrahi, Amlan Chakrabarti, Prasant Mohapatra:
Blockchain based secret key management for trusted platform module standard in reconfigurable platform. Concurr. Comput. Pract. Exp. 36(22) (2024) - Toshiki Matsumine, Hideki Ochiai, Junji Shikata:
An Efficient Information Reconciliation Scheme via Partial Encoding for Physical Layer Secret Key Generation. IEEE Commun. Lett. 28(6): 1263-1267 (2024) - Honghai Tang, Guyue Li, Tao Guo, Aiqun Hu:
A VT-Code-Based Information Reconciliation Scheme for Secret Key Generation Using RSS. IEEE Commun. Lett. 28(4): 783-787 (2024) - Ehsan Olyaei Torshizi, Werner Henkel:
Exploiting FDD Channel Reciprocity for Physical Layer Secret Key Generation in IoT Networks. IEEE Commun. Lett. 28(6): 1268-1272 (2024) - Viacheslav Kovtun, Yuriy Ivanov:
Crypto coding system based on the turbo codes with secret keys. ICT Express 10(2): 330-335 (2024) - Vahid Shahiri, Hamid Behroozi, Ali Kuhestani, Kai-Kit Wong:
Reconfigurable-Intelligent-Surface-Assisted Secret Key Generation Under Spatially Correlated Channels in Quasi-Static Environments. IEEE Internet Things J. 11(9): 15808-15822 (2024) - Ke Yuan, Ziwei Cheng, Keyan Chen, Bozhen Wang, Junyang Sun, Sufang Zhou, Chunfu Jia:
Multiple time servers timed-release encryption based on Shamir secret sharing for EHR cloud system. J. Cloud Comput. 13(1): 116 (2024) - Gonçalo Figueiredo, Rute A. S. Ferreira, Paulo S. André:
Enhancing secret key distribution through advanced color modulation in visible light communication. J. Opt. Commun. Netw. 16(8): 1 (2024) - Sonali Rokade, Nilamadhab Mishra:
Privacy preservation of medical data in blockchain with secret key generation using RideNN. Multim. Tools Appl. 83(23): 63523-63545 (2024) - Mohammadreza Keshavarzi, Hadi Zayyani, Ali Kuhestani, Hossein Ahmadi:
A new practical physical layer secret key generation in the presence of an untrusted relay. Phys. Commun. 66: 102407 (2024) - Arindam Sarkar, Krishna Daripa, Mohammad Zubair Khan, Abdulfattah Noorwali:
An efficient group synchronization of chaos-tuned neural networks for exchange of common secret key. Soft Comput. 28(5): 4413-4433 (2024) - Ruoyu Zhao, Wenying Wen, Youwen Zhu, Rushi Lan:
A Consumer-Oriented Image Transformation Scheme With a Secret Key for Privacy Protection. IEEE Signal Process. Lett. 31: 2280-2284 (2024) - Karl-Ludwig Besser, Rafael F. Schaefer, H. Vincent Poor:
Reliability and Latency Analysis for Wireless Communication Systems With a Secret-Key Budget. IEEE Trans. Commun. 72(2): 1033-1044 (2024) - Chen Chen, Junqing Zhang, Tianyu Lu, Magnus Sandell, Liquan Chen:
Secret Key Generation for IRS-Assisted Multi-Antenna Systems: A Machine Learning-Based Approach. IEEE Trans. Inf. Forensics Secur. 19: 1086-1098 (2024) - Ning Gao, Yuze Yao, Shi Jin, Cen Li, Michail Matthaiou:
Integrated Communications and Security: RIS-Assisted Simultaneous Transmission and Generation of Secret Keys. IEEE Trans. Inf. Forensics Secur. 19: 7573-7587 (2024) - Dengke Guo, Dongtang Ma, Jun Xiong, Xiaoran Liu, Jibo Wei:
On the Secret-Key Capacity Over Multipath Fading Channel. IEEE Trans. Inf. Forensics Secur. 19: 6044-6054 (2024) - Peng Xu, Jun Yang, Gaojie Chen, Zheng Yang, Yong Li, Moe Z. Win:
Physical-Layer Secret and Private Key Generation in Wireless Relay Networks With Correlated Eavesdropping Channels. IEEE Trans. Inf. Forensics Secur. 19: 985-1000 (2024) - Yicong Du, Huan Dai, Hongbo Liu, Yan Wang, Guyue Li, Yanzhi Ren, Yingying Chen, Ke Zhang:
Secret Key Generation Based on Manipulated Channel Measurement Matching. IEEE Trans. Mob. Comput. 23(10): 9532-9548 (2024) - Zhuangkun Wei, Weisi Guo:
Control Layer Security: Exploiting Unobservable Cooperative States of Autonomous Systems for Secret Key Generation. IEEE Trans. Mob. Comput. 23(10): 9989-10000 (2024) - Shaochuan Yang, Kaizhi Huang, Hehao Niu, Yi Wang, Zheng Chu, Li Zhen, De Mi:
IRS-Assisted Secret Key Generation With Transceiver Hardware Impairments. IEEE Trans. Veh. Technol. 73(8): 12154-12159 (2024) - Xinwei Zhang, Guyue Li, Junqing Zhang, Linning Peng, Aiqun Hu, Xianbin Wang:
Enabling Deep Learning-Based Physical-Layer Secret Key Generation for FDD-OFDM Systems in Multi-Environments. IEEE Trans. Veh. Technol. 73(7): 10135-10149 (2024) - Lei Hu, Guyue Li, Xuewen Qian, Aiqun Hu, Derrick Wing Kwan Ng:
Reconfigurable Intelligent Surface-Assisted Secret Key Generation in Spatially Correlated Channels. IEEE Trans. Wirel. Commun. 23(3): 2153-2166 (2024) - Lei Hu, Guyue Li, Aiqun Hu, Derrick Wing Kwan Ng:
Exploiting Malicious RIS for Secret Key Acquisition in Physical-Layer Key Generation. IEEE Wirel. Commun. Lett. 13(2): 417-421 (2024) - Yingbo Hua, Ahmed Maksud:
Secret-Key Capacity From MIMO Channel Probing. IEEE Wirel. Commun. Lett. 13(5): 1434-1438 (2024)
skipping 1,454 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-23 16:10 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint