Fig. 6From: Authenticated secret key generation in delay-constrained wireless systemsa Size of set \(\mathcal {D}\) for different SNR levels and \(\sigma _{e}^{2}\) when N=24.b Size of set \(\mathcal {D}\) for different values of κ when N=24Back to article page