{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:12:50Z","timestamp":1729627970305,"version":"3.28.0"},"reference-count":41,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/icuwb.2017.8250994","type":"proceedings-article","created":{"date-parts":[[2018,1,17]],"date-time":"2018-01-17T22:25:27Z","timestamp":1516227927000},"page":"1-7","source":"Crossref","is-referenced-by-count":4,"title":["Secure and energy-efficient interconnects for board-to-board communication"],"prefix":"10.1109","author":[{"given":"Bho","family":"Matthiesen","sequence":"first","affiliation":[]},{"given":"Stefan","family":"Pfennig","sequence":"additional","affiliation":[]},{"given":"Mario","family":"Bielert","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Ilsche","sequence":"additional","affiliation":[]},{"given":"Andrew","family":"Lonnstrom","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Juan A.","family":"Cabrera","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Scheunert","sequence":"additional","affiliation":[]},{"given":"Elke","family":"Franz","sequence":"additional","affiliation":[]},{"given":"Silvia","family":"Santini","sequence":"additional","affiliation":[]},{"given":"Thorsten","family":"Strufe","sequence":"additional","affiliation":[]},{"given":"Eduard A.","family":"Jorswieck","sequence":"additional","affiliation":[]},{"given":"Wolfgang E.","family":"Nagel","sequence":"additional","affiliation":[]},{"given":"Giang T.","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Frank H.P.","family":"Fitzek","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68564-7_9"},{"key":"ref38","first-page":"481","volume":"22","author":"eschweiler","year":"2012","journal-title":"Open Trace Format 2 The Next Generation of Scalable Trace Formats and Support Libraries ser Advances in Parallel Computing"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.4108\/eai.24-8-2015.2261105"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC.2017.8227702"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2181946"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"ref37","first-page":"79","article-title":"Score-P: A joint performance measurement run-time infrastructure for Periscope, Scalasca, TAU, and Vampir","author":"knupfer","year":"2011","journal-title":"Tools for High Performance Computing M"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/HPCSim.2011.5999835"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2011.121"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8191(96)00094-4"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2010.5762751"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/FGCT.2014.6933231"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-015-0035-7"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.10.002"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7996422"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2014.012214.00180"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2674989"},{"key":"ref16","volume":"17","author":"patterson","year":"1988","journal-title":"A Case for Redundant Arrays of Inexpensive Disks (RAID)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2054295"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISWCS.2016.7600898"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICUWB.2015.7324482"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2016.7848896"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2421496"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-14313-2_40"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1561\/9781601987891","volume":"12","author":"chaaban","year":"2015","journal-title":"Multi-way Communications An Information Theoretic Perspective ser Found and Trends Commun and Inf Theory"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2015.7421173"},{"key":"ref29","article-title":"Practical network coding","author":"chou","year":"2003","journal-title":"Allerton Conf Commun Contr Comput"},{"key":"ref5","volume":"11","author":"zappone","year":"2015","journal-title":"Energy Efficiency in Wireless Networks via Fractional Programming Theory ser Found and Trends Commun and Inf Theory"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/98.788210"},{"journal-title":"Workshop Broadband Wireless Commun Comput Boards (Atto-Nets) IEEE Int Conf Ubiquitous Wireless Broadband (ICUWB)","article-title":"Global sum rate optimal resource allocation for non-regenerative 3-way relay channels","year":"2017","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2012.6176577"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2016.2626249"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.133"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/18.850663"},{"key":"ref22","first-page":"93","author":"pfennig","year":"2016","journal-title":"End-to-End Key Establishment using Physical Layer Key Generation and Specific Attacker Model"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511977985"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301326"},{"key":"ref41","article-title":"Simulation models verification for resilient communication on a highly adaptive energy-efficient computer","author":"pfennig","year":"2016","journal-title":"High Performance Comput Symp (HPC) SCS Spring Simulation Multi-Conf (SpringSim)"},{"key":"ref23","article-title":"Robust secret sharing for end-to-end key establishment with physical layer keys under active attacks","author":"pfennig","year":"2017","journal-title":"Workshop Communi Security (WCS) Annu Int Conf Theory and Appl Cryptographic Techn EUROCRYPT"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462050"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.336"}],"event":{"name":"2017 IEEE 17th International Conference on Ubiquitous Wireless Broadband (ICUWB)","start":{"date-parts":[[2017,9,12]]},"location":"Salamanca","end":{"date-parts":[[2017,9,15]]}},"container-title":["2017 IEEE 17th International Conference on Ubiquitous Wireless Broadband (ICUWB)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8231151\/8250948\/08250994.pdf?arnumber=8250994","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,25]],"date-time":"2020-10-25T19:37:10Z","timestamp":1603654630000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8250994\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/icuwb.2017.8250994","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}