Fig. 5From: Authenticated secret key generation in delay-constrained wireless systemsEfficiency vs κ, for N=24, SNR=10 dBBack to article page