{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,18]],"date-time":"2025-04-18T05:10:32Z","timestamp":1744953032359,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/ictc.2013.6675552","type":"proceedings-article","created":{"date-parts":[[2013,12,4]],"date-time":"2013-12-04T15:58:59Z","timestamp":1386172739000},"page":"1053-1058","source":"Crossref","is-referenced-by-count":9,"title":["Robustness of secret key agreement protocol with massive MIMO under pilot contamination attack"],"prefix":"10.1109","author":[{"given":"Sanghun","family":"Im","sequence":"first","affiliation":[]},{"given":"Hyoungsuk","family":"Jeon","sequence":"additional","affiliation":[]},{"given":"Jinho","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Jeongseok","family":"Ha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2011.060711.101155"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2013.020413.110848"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.092810.091092"},{"journal-title":"WirelessCommunicationsPrinciplesandPractices","year":"2002","author":"rappaport","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2341-0"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/18.243431"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2012.020712.111298"},{"key":"1","doi-asserted-by":"crossref","DOI":"10.1201\/9781420010756","author":"katz","year":"2007","journal-title":"Introductionto Modern Cryptography Princi-plesand Protocols"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2043187"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921908"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/s001459900023"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/18.476316"},{"key":"9","article-title":"Secret key agreement under anactiveattackinmu-tddsystems with large antenna arrays","author":"im","year":"2013","journal-title":"Proc IEEE Globecom"},{"key":"8","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1109\/TIFS.2010.2052253","article-title":"Automatic secret keys from reciprocalmimo wireless channels: Measurement and analysis","volume":"5","author":"wallace","year":"2010","journal-title":"IEEE Trans Inf Forensics Security"}],"event":{"name":"2013 International Conference on ICT Convergence (ICTC)","start":{"date-parts":[[2013,10,14]]},"location":"JEJU ISLAND, Korea (South)","end":{"date-parts":[[2013,10,16]]}},"container-title":["2013 International Conference on ICT Convergence (ICTC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6661630\/6675287\/06675552.pdf?arnumber=6675552","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,4]],"date-time":"2019-08-04T08:20:57Z","timestamp":1564906857000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6675552\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/ictc.2013.6675552","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}