{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T13:29:28Z","timestamp":1773235768683,"version":"3.50.1"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1109\/icc.2009.5198999","type":"proceedings-article","created":{"date-parts":[[2009,8,11]],"date-time":"2009-08-11T16:20:30Z","timestamp":1250007630000},"page":"1-5","source":"Crossref","is-referenced-by-count":25,"title":["EPSON: Enhanced Physical Security in OFDM Networks"],"prefix":"10.1109","author":[{"given":"F.","family":"He","sequence":"first","affiliation":[]},{"given":"H.","family":"Man","sequence":"additional","affiliation":[]},{"given":"D.","family":"Kivanc","sequence":"additional","affiliation":[]},{"given":"B.","family":"McNair","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","author":"ross","year":"2006","journal-title":"A First Course in Probability"},{"key":"17","author":"terry","year":"2001","journal-title":"OFDM Wireless LANs A Theoretical and Practical Guide"},{"key":"18","year":"0"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2007.767"},{"key":"16","author":"peterson","year":"1995","journal-title":"Introduction to Spread Spectrum Communications"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.902666"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/18.850674"},{"key":"11","year":"0"},{"key":"12","article-title":"encryption key generation based on wireless channel statistics","author":"kamakaris","year":"2003","journal-title":"Wireless Networking Symposium"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381695"},{"key":"2","first-page":"44","article-title":"your 802.11 network has no clothes","author":"mishra","year":"2002","journal-title":"IEEE Communication Magazine"},{"key":"1","year":"0"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.2009842"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"5","article-title":"scalable location-based security in wireless networks","author":"faria","year":"2007"},{"key":"4","year":"0"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/CROWNCOM.2008.4562470"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055892"}],"event":{"name":"ICC 2009 - 2009 IEEE International Conference on Communications","location":"Dresden, Germany","start":{"date-parts":[[2009,6,14]]},"end":{"date-parts":[[2009,6,18]]}},"container-title":["2009 IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5198563\/5198564\/05198999.pdf?arnumber=5198999","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T16:41:32Z","timestamp":1489768892000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5198999\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icc.2009.5198999","relation":{},"subject":[],"published":{"date-parts":[[2009,6]]}}}