{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T07:28:58Z","timestamp":1763105338697},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/allerton.2012.6483378","type":"proceedings-article","created":{"date-parts":[[2013,3,27]],"date-time":"2013-03-27T16:58:45Z","timestamp":1364403525000},"page":"1374-1381","source":"Crossref","is-referenced-by-count":14,"title":["Interactive secret key generation over reciprocal fading channels"],"prefix":"10.1109","author":[{"given":"Ashish","family":"Khisti","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.120924"},{"key":"17","article-title":"Secret-key agreement over wiretap channels with transmitter side information","author":"khisti","year":"2010","journal-title":"European Wireless"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2180527"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2151188"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2011.6162578"},{"key":"13","article-title":"Secrecy via sources and channels","author":"prabhakaran","year":"2009","journal-title":"IEEE Trans Inform Theory"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2009.5205906"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2050832"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2050832"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2123093"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2158999"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2207382"},{"key":"23","first-page":"1","article-title":"Arq-based secret key sharing","author":"latif","year":"2009","journal-title":"ICC"},{"key":"24","article-title":"A broadcast approach to secret key generation over slow fading channels","author":"tang","year":"2011","journal-title":"CoRR"},{"key":"25","doi-asserted-by":"crossref","DOI":"10.1155\/2009\/506973","article-title":"Secret sharing over fastfading mimo wiretap channels","author":"wong","year":"2009","journal-title":"Special Issue on Wireless Physical Layer Security EURASIP J Wireless Commun Netw"},{"key":"26","article-title":"Relative channel reciprocity calibration in MIMO\/TDD systems","author":"kaltenberger","year":"2010","journal-title":"Future Netw Mobile Summit"},{"key":"27","article-title":"How much training is needed in a multiple-antenna wireless link?","author":"hassibi","year":"2011","journal-title":"IEEE Trans Inform Theory"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1006\/dspr.1996.0023"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.902666"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.838380"},{"key":"1","first-page":"128","article-title":"Radiotelepathy: Extracting a secret key from an unauthenticated wireless channel","author":"mathur","year":"2008","journal-title":"14th ACM International Conference on Mobile Computing and Networking"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2005.858853"},{"key":"5","first-page":"401","article-title":"Robust key generation from signal envelopes in wireless networks","author":"azimi-sadjadi","year":"2007","journal-title":"14th ACM Conference on Computer and Communications Security"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2006.262101"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/18.243431"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"}],"event":{"name":"2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","start":{"date-parts":[[2012,10,1]]},"location":"Monticello, IL, USA","end":{"date-parts":[[2012,10,5]]}},"container-title":["2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6475439\/6483185\/06483378.pdf?arnumber=6483378","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T06:11:16Z","timestamp":1498025476000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6483378\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/allerton.2012.6483378","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}