{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T14:30:47Z","timestamp":1725805847250},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319117638"},{"type":"electronic","value":"9783319117645"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11764-5_19","type":"book-chapter","created":{"date-parts":[[2014,9,23]],"date-time":"2014-09-23T18:53:32Z","timestamp":1411498412000},"page":"268-282","source":"Crossref","is-referenced-by-count":1,"title":["Configuration Hopping: A Secure Communication Protocol without Explicit Key Exchange"],"prefix":"10.1007","author":[{"given":"Yue","family":"Qiao","sequence":"first","affiliation":[]},{"given":"Kannan","family":"Srinivasan","sequence":"additional","affiliation":[]},{"given":"Anish","family":"Arora","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","unstructured":"NI PXIe-1082 user manual, \n                  \n                    http:\/\/www.ni.com\/pdf\/manuals\/372752b.pdf"},{"key":"19_CR2","unstructured":"RF-switches, \n                  \n                    http:\/\/www.analog.com\/en\/switchesmultiplexers\/rf-switches"},{"key":"19_CR3","unstructured":"USRP N210, \n                  \n                    https:\/\/www.ettus.com\/product\/details\/UN210-KIT"},{"key":"19_CR4","unstructured":"Arora, A., Sang, L.: Dialog codes for secure wireless communications. In: Proceedings of the 2009 International Conference on Information Processing in Sensor Networks, IPSN 2009, pp. 13\u201324. IEEE Computer Society (2009)"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Azimi-Sadjadi, B., Kiayias, A., Mercado, A., Yener, B.: Robust key generation from signal envelopes in wireless networks. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2007 (2007)","DOI":"10.1145\/1315245.1315295"},{"key":"19_CR6","unstructured":"Best, R.E.: Phase-Locked Loops. Professional Engineering. Mcgraw-hill (2003)"},{"key":"19_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/3-540-44987-6_28","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"R. Canetti","year":"2001","unstructured":"Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 453\u2013474. Springer, Heidelberg (2001)"},{"issue":"6","key":"19_CR8","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory\u00a022(6), 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Jain, M., Choi Il, J., Kim, T., Bharadia, D., Seth, S., Srinivasan, K., Levis, P., Katti, S., Sinha, P.: Practical, real-time, full duplex wireless. In: Proceedings of the 17th Annual International Conference on Mobile Computing and Networking, MobiCom 2011 (2011)","DOI":"10.1145\/2030613.2030647"},{"key":"19_CR10","unstructured":"Katz, J., Lindell, Y.: Introduction to Modern Cryptography (Chapman & Hall\/Crc Cryptography and Network Security Series). Chapman & Hall\/CRC (2007)"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Madiseh, M.G., McGuire, M.L., Neville, S.S., Cai, L., Horie, M.: Secret key generation and agreement in UWB communication channels. In: Proceedings of the Global Communications Conference, GLOBECOM 2008, pp. 1842\u20131846. IEEE (2008)","DOI":"10.1109\/GLOCOM.2008.ECP.356"},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Mathur, S., Trappe, W., Mandayam, N., Ye, C., Reznik, A.: Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, MobiCom 2008 (2008)","DOI":"10.1145\/1409944.1409960"},{"issue":"1","key":"19_CR13","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/TMC.2009.88","volume":"9","author":"N. Patwari","year":"2010","unstructured":"Patwari, N., Croft, J., Jana, S., Kasera, S.K.: High-rate uncorrelated bit extraction for shared secret key generation from channel measurements. IEEE Transactions on Mobile Computing\u00a09(1), 17\u201330 (2010)","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Qiao, Y., Srinivasan, K., Arora, A.: Shape matters, not the size: A new approach to extract secrets from channel. In: The Proccedings of the First ACM Workshop on Hot Topics in Wireless, HotWireless 2014 (2014)","DOI":"10.1145\/2643614.2643618"},{"key":"19_CR15","unstructured":"Rappaport, T.: Wireless Communications: Principles and Practice, 2nd edn. Prentice Hall PTR (2001)"}],"container-title":["Lecture Notes in Computer Science","Stabilization, Safety, and Security of Distributed Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11764-5_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,18]],"date-time":"2019-01-18T15:56:37Z","timestamp":1547826997000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11764-5_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319117638","9783319117645"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11764-5_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}