Christina Fragouli, László Czap, Iris Safaka
We present protocols for creating pairwise secrets between nodes in a wireless network, so that these secrets are secure from an eavesdropper, Eve, with unbounded computational and memory capabilities, but with limited network presence. We first present a ...
Ieee-Inst Electrical Electronics Engineers Inc2016