Author of the publication

Bringing PHY-Based Key Generation into the Field: An Evaluation for Practical Scenarios.

, , , , and . VTC Fall, page 1-5. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reciprocity enhancement and decorrelation schemes for PHY-based key generation., , , and . GLOBECOM Workshops, page 1367-1372. IEEE, (2014)Bringing PHY-Based Key Generation into the Field: An Evaluation for Practical Scenarios., , , , and . VTC Fall, page 1-5. IEEE, (2015)On the Energy Cost of Channel Based Key Agreement., , , , and . TrustED@CCS, page 31-41. ACM, (2016)Software- Defined Networking as an Enabler for Future Industrial Network Management., , , , , , , , , and . ETFA, page 1109-1112. IEEE, (2018)Secret key generation from static channels with untrusted relays., , , and . WiMob, page 635-642. IEEE Computer Society, (2015)Communication Abstraction Supports Network Resource Virtualisation in Automation., , , , , , , and . ISIE, page 697-702. IEEE, (2018)Secret key extraction from observations of an almost reciprocal radio channel.. University of Duisburg-Essen, Germany, (2019)Information reconciliation schemes in physical-layer security: A survey., , , , , and . Computer Networks, (2016)Network Slicing in Industry 4.0 Applications: Abstraction Methods and End-to-End Analysis., , , , and . IEEE Trans. Industrial Informatics, 14 (12): 5419-5427 (2018)Network Slicing for Ultra-Reliable Low Latency Communication in Industry 4.0 Scenarios., , , , and . CoRR, (2017)