Picture for Arsenia Chorti

Arsenia Chorti

AoA-Based Physical Layer Authentication in Analog Arrays under Impersonation Attacks

Add code
Jul 11, 2024
Viaarxiv icon

Secret Key Generation Rates for Line of Sight Multipath Channels in the Presence of Eavesdroppers

Add code
Apr 25, 2024
Viaarxiv icon

Physical Layer Authentication Using Information Reconciliation

Add code
Apr 19, 2024
Viaarxiv icon

How Physicality Enables Trust: A New Era of Trust-Centered Cyberphysical Systems

Add code
Nov 13, 2023
Viaarxiv icon

Smart Channel State Information Pre-processing for Joint Authentication and Secret Key Distillation

Add code
Jun 01, 2022
Figure 1 for Smart Channel State Information Pre-processing for Joint Authentication and Secret Key Distillation
Figure 2 for Smart Channel State Information Pre-processing for Joint Authentication and Secret Key Distillation
Figure 3 for Smart Channel State Information Pre-processing for Joint Authentication and Secret Key Distillation
Figure 4 for Smart Channel State Information Pre-processing for Joint Authentication and Secret Key Distillation
Viaarxiv icon

Physical Layer Security for 6G Systems why it is needed and how to make it happen

Add code
May 03, 2022
Viaarxiv icon

On the Use of CSI for the Generation of RF Fingerprints and Secret Keys

Add code
Oct 28, 2021
Figure 1 for On the Use of CSI for the Generation of RF Fingerprints and Secret Keys
Figure 2 for On the Use of CSI for the Generation of RF Fingerprints and Secret Keys
Figure 3 for On the Use of CSI for the Generation of RF Fingerprints and Secret Keys
Figure 4 for On the Use of CSI for the Generation of RF Fingerprints and Secret Keys
Viaarxiv icon

Finite Blocklength Secrecy Analysis of Polar and Reed-Muller Codes in BEC Semi-Deterministic Wiretap Channels

Add code
May 22, 2021
Figure 1 for Finite Blocklength Secrecy Analysis of Polar and Reed-Muller Codes in BEC Semi-Deterministic Wiretap Channels
Figure 2 for Finite Blocklength Secrecy Analysis of Polar and Reed-Muller Codes in BEC Semi-Deterministic Wiretap Channels
Figure 3 for Finite Blocklength Secrecy Analysis of Polar and Reed-Muller Codes in BEC Semi-Deterministic Wiretap Channels
Figure 4 for Finite Blocklength Secrecy Analysis of Polar and Reed-Muller Codes in BEC Semi-Deterministic Wiretap Channels
Viaarxiv icon

Distributed DoS Attack Detection in SDN: Trade offs in Resource Constrained Wireless Networks

Add code
Mar 25, 2021
Figure 1 for Distributed DoS Attack Detection in SDN: Trade offs in Resource Constrained Wireless Networks
Figure 2 for Distributed DoS Attack Detection in SDN: Trade offs in Resource Constrained Wireless Networks
Viaarxiv icon

Comparison of Short Blocklength Slepian-Wolf Coding for Key Reconciliation

Add code
Mar 21, 2021
Figure 1 for Comparison of Short Blocklength Slepian-Wolf Coding for Key Reconciliation
Figure 2 for Comparison of Short Blocklength Slepian-Wolf Coding for Key Reconciliation
Figure 3 for Comparison of Short Blocklength Slepian-Wolf Coding for Key Reconciliation
Figure 4 for Comparison of Short Blocklength Slepian-Wolf Coding for Key Reconciliation
Viaarxiv icon