{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T11:33:07Z","timestamp":1757590387749,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/iccw.2013.6649322","type":"proceedings-article","created":{"date-parts":[[2013,11,2]],"date-time":"2013-11-02T00:36:40Z","timestamp":1383352600000},"page":"692-696","source":"Crossref","is-referenced-by-count":7,"title":["Wireless Information-Theoretic Security in MANETs"],"prefix":"10.1109","author":[{"given":"Theofilos","family":"Chrysikos","sequence":"first","affiliation":[]},{"given":"Tasos","family":"Dagiuklas","sequence":"additional","affiliation":[]},{"given":"Stavros","family":"Kotsopoulos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1002\/0471743690"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1002\/0470841524"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2012.6399239"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1155\/2011\/628747"},{"journal-title":"Wireless Communications Principles & Practice","year":"2001","author":"rappaport","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/WD.2010.5657706"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOT.2009.5366135"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921908"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/WTS.2009.5068993"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2006.883797"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2006.261613"},{"journal-title":"Microwave Mobile Communications","year":"1974","author":"jakes","key":"20"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-010-9259-8"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.809563"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055917"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055892"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"9","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1007\/3-540-45539-6_24","article-title":"Information-theoretic key agreement: From weak to strong secrecy for free","volume":"1807","author":"maurer","year":"2000","journal-title":"Advances in Cryptology - EUROCRYPT 2000 Lecture Notes in Computer Science"},{"key":"8","first-page":"209","article-title":"Information-theoretically secure secret-key agreement by not authenticated public discussion","author":"maurer","year":"1997","journal-title":"Advances in Cryptology - EUROCRYPT '97"}],"event":{"name":"2013 IEEE International Conference on Communications (ICC). Workshops","start":{"date-parts":[[2013,6,9]]},"location":"Budapest","end":{"date-parts":[[2013,6,13]]}},"container-title":["2013 IEEE International Conference on Communications Workshops (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6637583\/6649166\/06649322.pdf?arnumber=6649322","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,3]],"date-time":"2020-02-03T14:06:29Z","timestamp":1580738789000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6649322\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/iccw.2013.6649322","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}