{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T02:07:14Z","timestamp":1725502034762},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1109\/glocom.2012.6503212","type":"proceedings-article","created":{"date-parts":[[2013,4,26]],"date-time":"2013-04-26T23:29:23Z","timestamp":1367018963000},"page":"807-812","source":"Crossref","is-referenced-by-count":0,"title":["Security embedding on UWB-IR physical layer"],"prefix":"10.1109","author":[{"given":"Ahmed","family":"Benfarah","sequence":"first","affiliation":[]},{"given":"Benoit","family":"Miscopein","sequence":"additional","affiliation":[]},{"given":"Jean-Marie","family":"Gorce","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5684218"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2172208"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998428"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/DYSPAN.2010.5457897"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/5.771068"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TBC.2009.2025840"},{"journal-title":"Digital Communications","year":"1995","author":"proakis","key":"11"},{"journal-title":"Handbook of Applied Cryptography","year":"1997","author":"menezes","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/WOWMOM.2008.4594926"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.916273"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2004.1327131"},{"key":"10","article-title":"IEEE 802.15.4a channel model- final report","author":"molisch","year":"2005","journal-title":"IEEE 802 15 4a Channel Sub-Committee Technical Report et Document IEEE 802 15-04-0662-02-004a"},{"key":"7","doi-asserted-by":"crossref","DOI":"10.1201\/9781420010756","author":"katz","year":"2007","journal-title":"Introduction to Modern Cryptography"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2006.878735"},{"journal-title":"FCC First Report and Order Regarding UWB Transmission","year":"2002","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.1999.821389"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1002\/0470867531"},{"key":"8","first-page":"1","article-title":"Keying hash functions for message authentication","author":"bellare","year":"1996","journal-title":"Advances in Cryptology-proceedings of Crypto 96"}],"event":{"name":"GLOBECOM 2012 - 2012 IEEE Global Communications Conference","start":{"date-parts":[[2012,12,3]]},"location":"Anaheim, CA, USA","end":{"date-parts":[[2012,12,7]]}},"container-title":["2012 IEEE Global Communications Conference (GLOBECOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6490098\/6503052\/06503212.pdf?arnumber=6503212","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,13]],"date-time":"2019-07-13T01:56:59Z","timestamp":1562983019000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6503212\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/glocom.2012.6503212","relation":{},"subject":[],"published":{"date-parts":[[2012,12]]}}}