Fig. 7From: Authenticated secret key generation in delay-constrained wireless systemsa Effective data rate achieved by the parallel heuristic approach and the sequential approach when N=12, SNR =10 dB, and κ=2. b Effective data rate achieved by the parallel heuristic approach and the sequential approach when N=64, SNR =10 dB, and κ=2. c Effective data rate achieved by the parallel heuristic approach and the sequential approach when N=12, SNR =0.2 dB, and κ=2. d Effective data rate achieved by the parallel heuristic approach and the sequential approach when N=64, SNR =0.2 dB, and κ=2Back to article page