{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T00:01:21Z","timestamp":1755993681516,"version":"3.44.0"},"reference-count":14,"publisher":"IEEE","license":[{"start":{"date-parts":[[2014,2,1]],"date-time":"2014-02-01T00:00:00Z","timestamp":1391212800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2014,2,1]],"date-time":"2014-02-01T00:00:00Z","timestamp":1391212800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,2]]},"DOI":"10.1109\/iccnc.2014.6785436","type":"proceedings-article","created":{"date-parts":[[2014,4,17]],"date-time":"2014-04-17T14:04:24Z","timestamp":1397743464000},"page":"782-786","source":"Crossref","is-referenced-by-count":4,"title":["PHY-layer authentication using hierarchical modulation and duobinary signaling"],"prefix":"10.1109","author":[{"given":"Vireshwar","family":"Kumar","sequence":"first","affiliation":[{"name":"Bradley Department of Electrical and Computer Engineering, Virginia Tech, USA"}]},{"given":"Jung-Min","family":"Park","sequence":"additional","affiliation":[{"name":"Bradley Department of Electrical and Computer Engineering, Virginia Tech, USA"}]},{"given":"T. Charles","family":"Clancy","sequence":"additional","affiliation":[{"name":"Bradley Department of Electrical and Computer Engineering, Virginia Tech, USA"}]},{"given":"Kaigui","family":"Bian","sequence":"additional","affiliation":[{"name":"School of Electronics Engineering and Computer Science, Peking University, USA"}]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998429"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2001.965193"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/DYSPAN.2010.5457897"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/2248371.2248400"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2011.5999762"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2012.6155872"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2011.5999761"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1741866.1741882"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/WCL.2012.050112.120059"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998428"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/WOWMOM.2008.4594926"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.916273"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2013.6682687"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.1977.1089476"}],"event":{"name":"2014 International Conference on Computing, Networking and Communications (ICNC)","start":{"date-parts":[[2014,2,3]]},"location":"Honolulu, HI, USA","end":{"date-parts":[[2014,2,6]]}},"container-title":["2014 International Conference on Computing, Networking and Communications (ICNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6778476\/6785290\/06785436.pdf?arnumber=6785436","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:20:46Z","timestamp":1755908446000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6785436\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/iccnc.2014.6785436","relation":{},"subject":[],"published":{"date-parts":[[2014,2]]}}}