{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,9]],"date-time":"2025-07-09T22:48:17Z","timestamp":1752101297345,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/glocomw.2014.7063613","type":"proceedings-article","created":{"date-parts":[[2015,3,20]],"date-time":"2015-03-20T17:21:39Z","timestamp":1426872099000},"page":"1302-1307","source":"Crossref","is-referenced-by-count":23,"title":["Secure key generation from OFDM subcarriers' channel responses"],"prefix":"10.1109","author":[{"given":"Junqing","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Alan","family":"Marshall","sequence":"additional","affiliation":[]},{"given":"Roger","family":"Woods","sequence":"additional","affiliation":[]},{"given":"Trung Q.","family":"Duong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2206385"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567117"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1109\/TIFS.2010.2043187","article-title":"Information-theoretically secret key generation for fading wireless channels","volume":"5","author":"ye","year":"2010","journal-title":"IEEE Trans Inf Forensics Security"},{"journal-title":"Wireless Communications Principles and Practice","year":"2001","author":"rappaport","key":"ref13"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1007\/b117713","author":"jeruchim","year":"2000","journal-title":"Simulation of Communication Systems Modeling Methodology and Techniques"},{"journal-title":"Wireless Lan Medium Access Control (Mac) and Physical Layer (Phy) Specification","year":"2012","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1963.1088793"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2011.01.011"},{"key":"ref18","article-title":"A matlab-based object-oriented approach to multipath fading channel simulation","author":"iskander","year":"2008","journal-title":"MathWorks"},{"key":"ref19","article-title":"TGn channel models","author":"erceg","year":"2004","journal-title":"IEEE TGn 802 11 Tech Rep 03\/940r4"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462004"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614356"},{"key":"ref6","first-page":"927","article-title":"Collaborative secret key extraction leveraging received signal strength in mobile wireless networks","author":"liu","year":"2012","journal-title":"Proc of the 31st IEEE International Conference on Computer Communications (INFOCOM)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130911"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934929"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.88"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409960"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2011.5999759"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.121010"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1137\/060651380"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.63"},{"key":"ref21","article-title":"A statistical test suite for random and pseudorandom number generators for cryptographic applications","author":"rukhin","year":"2010","journal-title":"National Institute of Standards and Technology Tech Rep Special Publication 800-22 Revision la"}],"event":{"name":"2014 IEEE Globecom Workshops (GC Wkshps)","start":{"date-parts":[[2014,12,8]]},"location":"Austin, TX, USA","end":{"date-parts":[[2014,12,12]]}},"container-title":["2014 IEEE Globecom Workshops (GC Wkshps)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7050532\/7063320\/07063613.pdf?arnumber=7063613","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,31]],"date-time":"2020-08-31T02:09:20Z","timestamp":1598839760000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7063613\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/glocomw.2014.7063613","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}