2022 16th European Conference on Antennas and Propagation (EuCAP) 2022
DOI: 10.23919/eucap53622.2022.9769194
|View full text |Cite
|
Sign up to set email alerts
|

A Study on Physical Layer Security Through Ray Tracing Simulations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 9 publications
0
0
0
Order By: Relevance
“…There are two methods for implementing cryptographic protocols: public‐key encryption and symmetric‐key encryption. These methods are discussed in References 6,7. These traditional techniques require complex key distribution protocols that may not be suitable for power‐limited networks such as IoT 8 .…”
Section: Introductionmentioning
confidence: 99%
“…There are two methods for implementing cryptographic protocols: public‐key encryption and symmetric‐key encryption. These methods are discussed in References 6,7. These traditional techniques require complex key distribution protocols that may not be suitable for power‐limited networks such as IoT 8 .…”
Section: Introductionmentioning
confidence: 99%