Research Article

A Novel Key Distribution Scheme Based on Transmission Delays

Figure 14

Attack model.