{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,11]],"date-time":"2026-01-11T21:13:22Z","timestamp":1768166002833,"version":"3.49.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/cns.2017.8228665","type":"proceedings-article","created":{"date-parts":[[2017,12,21]],"date-time":"2017-12-21T19:55:49Z","timestamp":1513886149000},"page":"374-375","source":"Crossref","is-referenced-by-count":7,"title":["The realization of key extraction based on USRP and OFDM channel response"],"prefix":"10.1109","author":[{"given":"Wei","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Aidong","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Yixin","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Huanhuan","family":"Song","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Ouyang","sequence":"additional","affiliation":[]},{"given":"Xiping","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409960"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315295"},{"key":"ref10","author":"cai","year":"2013","journal-title":"Research on Theoretical Limit and Quantization Methods in Secret KeyGeneration Based on Characteristics of Wireless Channel"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1109\/TMC.2009.88","article-title":"High-rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements","volume":"9","author":"patwari","year":"2009","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"ref11","first-page":"130","article-title":"Error Control Coding","volume":"44","author":"lin","year":"2004","journal-title":"Principles of Mobile Communication"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934929"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/ecjc.20167"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462004"},{"key":"ref2","author":"okamoto","year":"1997","journal-title":"Modern Cryptography"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567117"},{"key":"ref1","author":"kasahara","year":"2002","journal-title":"Cryptography Kyoritsu"}],"event":{"name":"2017 IEEE Conference on Communications and Network Security (CNS)","location":"Las Vegas, NV","start":{"date-parts":[[2017,10,9]]},"end":{"date-parts":[[2017,10,11]]}},"container-title":["2017 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8170165\/8228604\/08228665.pdf?arnumber=8228665","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,8]],"date-time":"2019-10-08T08:41:07Z","timestamp":1570524067000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8228665\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/cns.2017.8228665","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}