{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T16:50:28Z","timestamp":1730220628111,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/eucnc.2015.7194050","type":"proceedings-article","created":{"date-parts":[[2015,8,13]],"date-time":"2015-08-13T22:54:58Z","timestamp":1439506498000},"page":"108-112","source":"Crossref","is-referenced-by-count":2,"title":["Tag signals for early authentication and Secret Key Generation in wireless public networks"],"prefix":"10.1109","author":[{"given":"Renaud","family":"Moliere","sequence":"first","affiliation":[]},{"given":"Francois","family":"Delaveau","sequence":"additional","affiliation":[]},{"given":"Christiane L.","family":"Kameni Ngassa","sequence":"additional","affiliation":[]},{"given":"Claude","family":"Lemenager","sequence":"additional","affiliation":[]},{"given":"Taghrid","family":"Mazloum","sequence":"additional","affiliation":[]},{"given":"Alain","family":"Sibille","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"EC Project FuDu radios for local access (DUPLO)","first-page":"7","year":"0","key":"ref4"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1109\/JSAC.2010.100608","article-title":"Anti-jamming broadcast communication using uncoordinated spread specrum techniques","volume":"28","author":"p\u00f6pper","year":"2010","journal-title":"IEEE Journal on Selected Areas in Comm"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2015.7145702"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511977985"},{"journal-title":"IEEE-802 11&#x2013;2012 Part 11","year":"2012","key":"ref11"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2030613.2030647"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1109\/JCN.2012.6292245","article-title":"Towards robust key extraction from multipath wireless channels","volume":"14","author":"el","year":"2012","journal-title":"IEEE J Commun and Netw"},{"key":"ref7","article-title":"Lattice codes achieving strong secrecy over the mod-? Gaussian channel","author":"belfiore","year":"2012","journal-title":"Proc IEEE Int Symp Info Theory"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1109\/TIFS.2010.2052253","article-title":"Automatic secret keys from reciprocal MIMO Wireless channels: measurement and analysis","volume":"5","author":"wallace","year":"2010","journal-title":"IEEE Trans Inform Forens Sec"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"journal-title":"Wie Merkels Handy abgeh&#x00F6;rt werden konnte","year":"2014","key":"ref1"}],"event":{"name":"2015 European Conference on Networks and Communications (EuCNC)","start":{"date-parts":[[2015,6,29]]},"location":"Paris","end":{"date-parts":[[2015,7,2]]}},"container-title":["2015 European Conference on Networks and Communications (EuCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7179207\/7194024\/07194050.pdf?arnumber=7194050","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,4]],"date-time":"2020-09-04T21:52:37Z","timestamp":1599256357000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7194050\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/eucnc.2015.7194050","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}