{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T21:00:30Z","timestamp":1743109230216,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":4,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781441959058"},{"type":"electronic","value":"9781441959065"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-1-4419-5906-5_55","type":"book-chapter","created":{"date-parts":[[2011,10,27]],"date-time":"2011-10-27T13:52:05Z","timestamp":1319723525000},"page":"682-683","source":"Crossref","is-referenced-by-count":0,"title":["Key Generation Using Physical Properties of Wireless Communication"],"prefix":"10.1007","author":[{"given":"Aggelos","family":"Kiayias","sequence":"first","affiliation":[]},{"given":"Bulent","family":"Yener","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"11","key":"55_CR1_55","doi-asserted-by":"publisher","first-page":"3776","DOI":"10.1109\/TAP.2005.858853","volume":"53","author":"T Aono","year":"2005","unstructured":"Aono T, Higuchi K, Ohira T, Komiyama B, Sasaoka H (2005) Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels. IEEE Trans Antennas Propag 53(11):3776\u20133784","journal-title":"IEEE Trans Antennas Propag"},{"key":"55_CR2_55","first-page":"401","volume-title":"Robust key generation from signal envelopes in wireless networks","author":"B Azimi-Sadjadi","year":"2007","unstructured":"Azimi-Sadjadi B, Kiayias A, Mercado A, Yener B (2007) Robust key generation from signal envelopes in wireless networks. In: ACM conference on computer and communications security, Alexandria, pp\u00a0401\u2013410"},{"key":"55_CR3_55","first-page":"321","volume-title":"On the effectiveness of secret key extraction from wireless signal strength in real environments","author":"S Jana","year":"2009","unstructured":"Jana S, Premnath SN, Clark M, Kasera SK, Patwari N, Krishnamurthy SV (2009) On the effectiveness of secret key extraction from wireless signal strength in real environments. In: MOBICOM, Beijing, pp\u00a0321\u2013332"},{"key":"55_CR4_55","first-page":"128","volume-title":"Radio-telepathy: extracting a secret key from an unauthenticated wireless channel","author":"S Mathur","year":"2008","unstructured":"Mathur S, Trappe W, Mandayam NB, Ye C, Reznik A (2008) Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: MOBICOM, San Francisco, pp\u00a0128\u2013139"}],"container-title":["Encyclopedia of Cryptography and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4419-5906-5_55","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,2]],"date-time":"2020-06-02T00:45:57Z","timestamp":1591058757000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4419-5906-5_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9781441959058","9781441959065"],"references-count":4,"URL":"https:\/\/doi.org\/10.1007\/978-1-4419-5906-5_55","relation":{},"subject":[],"published":{"date-parts":[[2011]]}}}