Y Zou, Y Chai, S Shi, L Wang, Y Peng… - Security and …, 2020 - Wiley Online Library
Due to the transparency of the wireless channel, users in multiple‐key environment are
vulnerable to eavesdropping during the process of uploading personal data and re …