On the Use of CSI for the Generation of RF Fingerprints and Secret Keys

Open in new window