ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
1
views
0
references
Top references
cited by
1
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,011
similar
All similar
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Keyless authentication over noisy channel
proceedings-article
Author(s):
Wenwen Tu
,
Lifeng Lai
Publication date
(Print):
November 2016
Publisher:
IEEE
Conference name:
2016 50th Asilomar Conference on Signals, Systems and Computers
Conference date:
December 6, 2016 - December 9, 2016
Read this article at
ScienceOpen
Publisher
Review
Review article
Invite someone to review
Bookmark
Cite as...
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Electron Channelling Contrast Imaging (ECCI)
Author and article information
Conference
Publisher:
IEEE
Publication date:
November 2016
Publication date (Print):
November 2016
Pages
: 1665-1669
Article
DOI:
10.1109/ACSSC.2016.7869664
SO-VID:
01d8d404-95d8-423a-a53e-46c5fcbb3478
Copyright ©
© 2016
Conference name:
2016 50th Asilomar Conference on Signals, Systems and Computers
Conference location:
Pacific Grove, CA
Conference date:
December 6, 2016 - December 9, 2016
History
Data availability:
Comments
Comment on this article
Sign in to comment
scite_
Similar content
2,011
A Hash based Approach for Secure Keyless Steganography in Lossless RGB Images
Authors:
Ankit Chaudhary
,
J. Vasavada
,
J. L. Raheja
…
An Efficient Keyless Fragmentation Algorithm for Data Protection
Authors:
Katarzyna Kapusta
,
Gerard Memmi
,
Hassan Noura
Security-capacity trade-off in large wireless networks using keyless secrecy
Authors:
S. Vasudevan
,
D. Goeckel
,
D. Towsley
See all similar
Cited by
1
Energy-Efficient Mobile-Edge Computation Offloading over Multiple Fading Blocks
Authors:
Rongfei Fan
,
Fudong Li
,
Song Jin
…
See all cited by