"Power maximisation technique for generating secret keys by exploiting ..."

Xiaoping Wang et al. (2020)

Details and statistics

DOI: 10.1049/IET-COM.2019.0956

access: closed

type: Journal Article

metadata version: 2024-02-05

a service of  Schloss Dagstuhl - Leibniz Center for Informatics