{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:13:56Z","timestamp":1758845636906},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/glocomw.2016.7849064","type":"proceedings-article","created":{"date-parts":[[2017,2,9]],"date-time":"2017-02-09T16:41:58Z","timestamp":1486658518000},"source":"Crossref","is-referenced-by-count":28,"title":["The Passive Eavesdropper Affects My Channel: Secret-Key Rates under Real-World Conditions"],"prefix":"10.1109","author":[{"given":"Christian","family":"Zenger","sequence":"first","affiliation":[]},{"given":"Hendrik","family":"Vogt","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Zimmer","sequence":"additional","affiliation":[]},{"given":"Aydin","family":"Sezgin","sequence":"additional","affiliation":[]},{"given":"Christof","family":"Paar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1499","article-title":"Key generation exploiting MIMO channel evolution: Algorithms and theoretical limits","author":"wallace","year":"2009","journal-title":"3rd European Conference on Antennas and Propagation (EuCAP)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409960"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614356"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511841224"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2521718"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2498621"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.2200\/S00086ED1V01Y200712SPR03"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.69.066138"},{"key":"ref18","article-title":"Probability, Random Variables, and Stochastic Processes, ser","author":"papoulis","year":"2002","journal-title":"McGraw-Hill series in electrical engineering Communications and signal processing"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.4108\/eai.22-7-2015.2260194"},{"key":"ref4","article-title":"Practical limitations of secret-key generation in narrowband wireless environments","author":"pierrot","year":"2014","journal-title":"arXiv preprint arXiv 1312 3304"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2206385"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2195176"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.114"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883407"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.902666"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1161289.1161297"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/18.243431"},{"key":"ref20","author":"biglieri","year":"2010","journal-title":"MIMO Wireless Communications"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.4236\/cn.2010.21010"}],"event":{"name":"2016 IEEE Globecom Workshops (GC Wkshps)","location":"Washington, DC, USA","start":{"date-parts":[[2016,12,4]]},"end":{"date-parts":[[2016,12,8]]}},"container-title":["2016 IEEE Globecom Workshops (GC Wkshps)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7840534\/7848793\/07849064.pdf?arnumber=7849064","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T17:42:31Z","timestamp":1488390151000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7849064\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/glocomw.2016.7849064","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}