Fig. 1From: Authenticated secret key generation in delay-constrained wireless systemsRoadmap of contributionsBack to article page