{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T16:51:02Z","timestamp":1770915062903,"version":"3.50.1"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,4]]},"DOI":"10.1109\/globecom54140.2023.10437788","type":"proceedings-article","created":{"date-parts":[[2024,2,26]],"date-time":"2024-02-26T19:45:36Z","timestamp":1708976736000},"page":"3294-3299","source":"Crossref","is-referenced-by-count":3,"title":["Passive Eavesdropping Can Significantly Slow Down RIS-Assisted Secret Key Generation"],"prefix":"10.1109","author":[{"given":"Ningya","family":"Xu","sequence":"first","affiliation":[{"name":"Beijing University of Posts and Telecommunications"}]},{"given":"Guoshun","family":"Nan","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications"}]},{"given":"Xiaofeng","family":"Tao","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"The research and improvement of the key management schemes in LTE\/SAE system[D]","author":"Shi","year":"2017"},{"issue":"3","key":"ref2","first-page":"211","article-title":"Secret key extraction in wireless channel[J]","volume":"1","author":"Li","year":"2014","journal-title":"Journal of Cryptologic Research"},{"issue":"10","key":"ref3","first-page":"2330","article-title":"Development of Wireless Physical Layer Key Generation Technology and New Challenges[J]","volume":"42","author":"Kaizhi","year":"2020","journal-title":"Journal of Electronics & Information Technology"},{"issue":"2","key":"ref4","first-page":"224","article-title":"Research on Physical-layer Security Based on Device and Channel Characteristics","volume":"7","author":"Li","year":"2020","journal-title":"Journal of Cryptologic Research"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900107"},{"issue":"2","key":"ref6","first-page":"77","article-title":"Key generation method based on reconfigurable intelligent surface in quasi-static scene [J]","volume":"7","author":"HAO","year":"2021","journal-title":"Chinese Journal of Network and Information Security"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3045728"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2021.3084347"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2021.3130635"},{"issue":"5","key":"ref10","first-page":"1304","article-title":"The effect of eavesdroppers statistics in experimental wireless secret-key generation","volume":"14","author":"Pierrot","year":"2014","journal-title":"Comput. Sci."},{"issue":"6","key":"ref11","first-page":"1426","article-title":"Peak-to-average Power Ratio Reduction Algorithm of Artificial-noise-aided Secure Signal[J]","volume":"40","author":"HONG","year":"2018","journal-title":"Journal of Electronics and Information Technology"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2017.8171176"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2016.7794859"},{"key":"ref14","first-page":"043","article-title":"Survey of physical layer security of intelligent reflecting surface-assisted wireless communication systems [J]","volume":"002","author":"LU","year":"2022","journal-title":"Journal on Communications"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2021.3061301"},{"issue":"7","key":"ref16","first-page":"2264","article-title":"MIMO Fast Wireless Secret Key Generation Based on Intelligent Reflecting Surface[J]","volume":"44","author":"Tang","year":"2022","journal-title":"Journal of Electronics and Information Technology"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2022-Fall57202.2022.10013083"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45041.2023.10279807"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2023.3288249"},{"issue":"1","key":"ref20","first-page":"57","article-title":"A Survey of Key Generation from Wireless Channels [J]","volume":"47","author":"Wa","year":"2021","journal-title":"Radio Communications Technology"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"issue":"02","key":"ref22","first-page":"490","article-title":"Secret Phase Key Generation Based on Multibit Adaptive Quantization[J]","volume":"34","author":"HU","year":"2017","journal-title":"Application Research of Computer"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-22r1a"}],"event":{"name":"GLOBECOM 2023 - 2023 IEEE Global Communications Conference","location":"Kuala Lumpur, Malaysia","start":{"date-parts":[[2023,12,4]]},"end":{"date-parts":[[2023,12,8]]}},"container-title":["GLOBECOM 2023 - 2023 IEEE Global Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10436708\/10436716\/10437788.pdf?arnumber=10437788","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T01:53:57Z","timestamp":1709258037000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10437788\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,4]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/globecom54140.2023.10437788","relation":{},"subject":[],"published":{"date-parts":[[2023,12,4]]}}}