Protecting Secret Key Generation Systems Against Jamming: Energy Harvesting and Channel Hopping Approaches. Belmega, E., V. & Chorti, A. IEEE Transactions on Information Forensics and Security, 12(11):2611-2626, 11, 2017.
Website bibtex @article{
title = {Protecting Secret Key Generation Systems Against Jamming: Energy Harvesting and Channel Hopping Approaches},
type = {article},
year = {2017},
identifiers = {[object Object]},
keywords = {game-theory,jamming,key-generation},
pages = {2611-2626},
volume = {12},
websites = {http://dx.doi.org/10.1109/tifs.2017.2713342},
month = {11},
id = {4af60be4-7f16-3b44-8409-ce104f54ae4e},
created = {2018-07-12T21:32:39.928Z},
file_attached = {false},
profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},
group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},
last_modified = {2018-07-12T21:32:39.928Z},
read = {false},
starred = {false},
authored = {false},
confirmed = {true},
hidden = {false},
citation_key = {belmega17},
source_type = {article},
private_publication = {false},
bibtype = {article},
author = {Belmega, E Veronica and Chorti, Arsenia},
journal = {IEEE Transactions on Information Forensics and Security},
number = {11}
}
Downloads: 0
{"_id":"gzNEDB5oEkfQMxy3u","bibbaseid":"belmega-chorti-protectingsecretkeygenerationsystemsagainstjammingenergyharvestingandchannelhoppingapproaches-2017","downloads":0,"creationDate":"2019-02-15T15:15:02.193Z","title":"Protecting Secret Key Generation Systems Against Jamming: Energy Harvesting and Channel Hopping Approaches","author_short":["Belmega, E., V.","Chorti, A."],"year":2017,"bibtype":"article","biburl":null,"bibdata":{"title":"Protecting Secret Key Generation Systems Against Jamming: Energy Harvesting and Channel Hopping Approaches","type":"article","year":"2017","identifiers":"[object Object]","keywords":"game-theory,jamming,key-generation","pages":"2611-2626","volume":"12","websites":"http://dx.doi.org/10.1109/tifs.2017.2713342","month":"11","id":"4af60be4-7f16-3b44-8409-ce104f54ae4e","created":"2018-07-12T21:32:39.928Z","file_attached":false,"profile_id":"f954d000-ce94-3da6-bd26-b983145a920f","group_id":"b0b145a3-980e-3ad7-a16f-c93918c606ed","last_modified":"2018-07-12T21:32:39.928Z","read":false,"starred":false,"authored":false,"confirmed":"true","hidden":false,"citation_key":"belmega17","source_type":"article","private_publication":false,"bibtype":"article","author":"Belmega, E Veronica and Chorti, Arsenia","journal":"IEEE Transactions on Information Forensics and Security","number":"11","bibtex":"@article{\n title = {Protecting Secret Key Generation Systems Against Jamming: Energy Harvesting and Channel Hopping Approaches},\n type = {article},\n year = {2017},\n identifiers = {[object Object]},\n keywords = {game-theory,jamming,key-generation},\n pages = {2611-2626},\n volume = {12},\n websites = {http://dx.doi.org/10.1109/tifs.2017.2713342},\n month = {11},\n id = {4af60be4-7f16-3b44-8409-ce104f54ae4e},\n created = {2018-07-12T21:32:39.928Z},\n file_attached = {false},\n profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},\n group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},\n last_modified = {2018-07-12T21:32:39.928Z},\n read = {false},\n starred = {false},\n authored = {false},\n confirmed = {true},\n hidden = {false},\n citation_key = {belmega17},\n source_type = {article},\n private_publication = {false},\n bibtype = {article},\n author = {Belmega, E Veronica and Chorti, Arsenia},\n journal = {IEEE Transactions on Information Forensics and Security},\n number = {11}\n}","author_short":["Belmega, E., V.","Chorti, A."],"urls":{"Website":"http://dx.doi.org/10.1109/tifs.2017.2713342"},"bibbaseid":"belmega-chorti-protectingsecretkeygenerationsystemsagainstjammingenergyharvestingandchannelhoppingapproaches-2017","role":"author","keyword":["game-theory","jamming","key-generation"],"downloads":0},"search_terms":["protecting","secret","key","generation","systems","against","jamming","energy","harvesting","channel","hopping","approaches","belmega","chorti"],"keywords":["game-theory","jamming","key-generation"],"authorIDs":[]}