{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T11:00:18Z","timestamp":1763809218102,"version":"build-2065373602"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1109\/infcom.2013.6566763","type":"proceedings-article","created":{"date-parts":[[2013,8,1]],"date-time":"2013-08-01T20:12:57Z","timestamp":1375387977000},"page":"200-204","source":"Crossref","is-referenced-by-count":50,"title":["Is link signature dependable for wireless security?"],"prefix":"10.1109","author":[{"given":"Xiaofan","family":"He","sequence":"first","affiliation":[]},{"given":"Huaiyu","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Wenbo","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Ning","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/49.995514"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/26.837052"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511841224"},{"journal-title":"Microwave Mobile Communications","year":"1974","author":"jakes","key":"15"},{"journal-title":"Wireless Communications","year":"2011","author":"molisch","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195669"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1972551.1972559"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2005.850275"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2003.810299"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566763"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287867"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2341-0"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814466"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1161289.1161297"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1049\/ip-rsn:19981750"},{"key":"7","article-title":"Radiotelepathy: Extracting a secret key from an unauthenticated wireless channel","author":"mathur","year":"2008","journal-title":"Proc of ACM MobiCom"},{"key":"6","article-title":"Robust key generation from signal envelopes in wireless networks","author":"azimi-sadjadi","year":"2007","journal-title":"Proc of ACM CCS"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.24"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409949"},{"key":"9","article-title":"Wireless communications: Principles and practice","author":"rappaport","year":"2001","journal-title":"Prentice Hall"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.88"}],"event":{"name":"IEEE INFOCOM 2013 - IEEE Conference on Computer Communications","start":{"date-parts":[[2013,4,14]]},"location":"Turin, Italy","end":{"date-parts":[[2013,4,19]]}},"container-title":["2013 Proceedings IEEE INFOCOM"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6556116\/6566708\/06566763.pdf?arnumber=6566763","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T21:14:47Z","timestamp":1490217287000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6566763\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/infcom.2013.6566763","relation":{},"subject":[],"published":{"date-parts":[[2013,4]]}}}