Fig. 2From: Authenticated secret key generation in delay-constrained wireless systemsSecret key generation between Alice and BobBack to article page