{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,27]],"date-time":"2024-08-27T17:08:04Z","timestamp":1724778484739},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,3]]},"DOI":"10.1109\/infcom.2010.5461974","type":"proceedings-article","created":{"date-parts":[[2010,5,12]],"date-time":"2010-05-12T20:54:40Z","timestamp":1273697680000},"source":"Crossref","is-referenced-by-count":42,"title":["Secure Wireless Communication with Dynamic Secrets"],"prefix":"10.1109","author":[{"given":"Sheng","family":"Xiao","sequence":"first","affiliation":[]},{"given":"Weibo","family":"Gong","sequence":"additional","affiliation":[]},{"given":"Don","family":"Towsley","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Ansi\/ieee standard 802.11, part 11: Wireless Ian medium access control (mac) and physical layer (phy) specifications","year":"2003","journal-title":"IEEE-SA Standards Board Tech Rep"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48658-5_15"},{"key":"ref12","article-title":"Multiple-input multiple-output gaussian broadcast channels with confidential messages","author":"liu","year":"2009","journal-title":"CoRR abs\/0903 3786"},{"key":"ref13","article-title":"Multi-antenna gaussian broadcast channels with confidential messages","author":"liu","year":"0","journal-title":"Information Theory 2008 ISIT 2008 IEEE International Symposium"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409960"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.809563"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.809560"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.809559"},{"key":"ref19","article-title":"Secure hash signature standard (shs) (fips pub 180&#x2013;2)","year":"2001","journal-title":"Technical Report NIST"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/18.476316"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2006.261613"},{"key":"ref6","article-title":"Wireless information-theoretic security - part ii: Practical implementation","author":"bloch","year":"2006","journal-title":"IEEE Trans on Information Theory"},{"key":"ref5","article-title":"Wireless information-theoretic security - part i: Theoretical aspects","author":"bloch","year":"2006","journal-title":"IEEE Trans on Information Theory"},{"key":"ref8","article-title":"Key derivation and randomness extraction","author":"chevassut","year":"2005","journal-title":"Technical report In Crypto 05"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(79)90044-8"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1145\/1315245.1315295","article-title":"Robust key generation from signal envelopes in wireless networks","author":"azimi-sadjadi","year":"2007","journal-title":"CCS '07"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1006\/dspr.1996.0023"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2005.858853"},{"key":"ref20","article-title":"On measures of information and entropy","author":"renyi","year":"1960","journal-title":"Proceedings of the 4th Berkeley Symposium on Mathematics Statistics and Probability"},{"key":"ref22","article-title":"On the throughput of secure hybrid-arq protocols for gaussian block-fading channels","author":"tang","year":"2007","journal-title":"CoRR abs\/0712 4135"},{"key":"ref21","author":"schneier","year":"1995","journal-title":"Applied Cryptography Protocols Algorithms and Source Code in C"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICUWB.2007.4380954"},{"key":"ref23","author":"trevisan","year":"0","journal-title":"Extractors and pseudorandom generators"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2007.18"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2008.4753216"}],"event":{"name":"IEEE INFOCOM 2010 - IEEE Conference on Computer Communications","location":"San Diego, CA, USA","start":{"date-parts":[[2010,3,14]]},"end":{"date-parts":[[2010,3,19]]}},"container-title":["2010 Proceedings IEEE INFOCOM"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5461675\/5461899\/05461974.pdf?arnumber=5461974","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T08:07:46Z","timestamp":1497859666000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5461974\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,3]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/infcom.2010.5461974","relation":{},"subject":[],"published":{"date-parts":[[2010,3]]}}}