Abstract
A basic two-terminal secret key generation model is considered, where the interactive communication rate between the terminals may be limited, and in ......
小提示:本篇文献需要登录阅读全文,点击跳转登录