{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T00:01:17Z","timestamp":1755993677460,"version":"3.44.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2013,10,1]],"date-time":"2013-10-01T00:00:00Z","timestamp":1380585600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2013,10,1]],"date-time":"2013-10-01T00:00:00Z","timestamp":1380585600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/cns.2013.6682687","type":"proceedings-article","created":{"date-parts":[[2013,12,17]],"date-time":"2013-12-17T19:48:17Z","timestamp":1387309697000},"page":"10-18","source":"Crossref","is-referenced-by-count":18,"title":["PHY-layer authentication by introducing controlled inter symbol interference"],"prefix":"10.1109","author":[{"given":"Vireshwar","family":"Kumar","sequence":"first","affiliation":[{"name":"Bradley Department of Electrical and Computer Engineering, Virginia Tech, USA"}]},{"given":"Jung-Min Jerry\u201d","family":"Park","sequence":"additional","affiliation":[{"name":"Bradley Department of Electrical and Computer Engineering, Virginia Tech, USA"}]},{"given":"T. Charles","family":"Clancy","sequence":"additional","affiliation":[{"name":"Bradley Department of Electrical and Computer Engineering, Virginia Tech, USA"}]},{"given":"Kaigui","family":"Bian","sequence":"additional","affiliation":[{"name":"School of Electronics Engineering and Computer Science, Peking University, China"}]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2005.863505"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ISSPIT.2005.1577145"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.070194"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/5.771068"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.24"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409959"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998429"},{"key":"16","first-page":"25","article-title":"Transient-based identification of wireless sensor nodes","author":"danev","year":"0","journal-title":"Int Conf Inform Process Sensor Netw Apr 2009"},{"key":"13","article-title":"Detecting rogue devices in Bluetooth networks using radio frequency fingerprinting","author":"hall","year":"2006","journal-title":"Commun Comput Netw"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/CJECE.2007.364330"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1973.9030"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/2248371.2248400"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/TBC.2004.834027"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/WOWMOM.2008.4594926"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2004.1327131"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.916273"},{"journal-title":"Final Report of the NSF Workshop on Enhancing Access to the Radio Spectrum (EARS)","year":"2010","author":"bernhard","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1972.1054829"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.1977.1089476"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/WCL.2012.050112.120059"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/DYSPAN.2010.5457897"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998428"},{"journal-title":"Digital Communications","year":"2008","author":"proakis","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2001.966001"}],"event":{"name":"2013 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2013,10,14]]},"location":"National Harbor, MD, USA","end":{"date-parts":[[2013,10,16]]}},"container-title":["2013 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6675898\/6682673\/06682687.pdf?arnumber=6682687","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:19:27Z","timestamp":1755908367000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6682687\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/cns.2013.6682687","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}