Fig. 4From: Authenticated secret key generation in delay-constrained wireless systemsa Efficiency comparison for N=12, SNR=10 dB, and κ=2. b Efficiency comparison for N=64, SNR=10 dB, and κ=2Back to article page