{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:41:43Z","timestamp":1729672903945,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1109\/infcom.2013.6567030","type":"proceedings-article","created":{"date-parts":[[2013,8,1]],"date-time":"2013-08-01T20:12:57Z","timestamp":1375387977000},"page":"2265-2273","source":"Crossref","is-referenced-by-count":10,"title":["Exchanging pairwise secrets efficiently"],"prefix":"10.1109","author":[{"given":"Iris","family":"Safaka","sequence":"first","affiliation":[]},{"given":"Christina","family":"Fragouli","sequence":"additional","affiliation":[]},{"given":"Katerina","family":"Argyraki","sequence":"additional","affiliation":[]},{"given":"Suhas","family":"Diggavi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Probability and Computing Randomized Algorithm and Probabilistic Analysis","year":"2006","author":"mitzenmacher","key":"17"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934889"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/2390231.2390244"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1791212.1791222"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5461974"},{"key":"11","doi-asserted-by":"crossref","DOI":"10.1145\/1315245.1315295","article-title":"Robust key generation from signal envelopes in wireless networks","author":"azimi-sadjadi","year":"2007","journal-title":"Proceedings of the ACM Conference on Computer and Communications Security (CCS)"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2043187"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01001-9_12"},{"journal-title":"The Theory of Error Correcting Codes","year":"2006","author":"macwilliams","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307643"},{"key":"5","doi-asserted-by":"crossref","DOI":"10.1117\/12.664114","article-title":"High speed quantum key distribution system supports onetime pad encryption of real-time video","volume":"6244","author":"mink","year":"2006","journal-title":"Proceedings of SPIE"},{"journal-title":"Companies Developing QKD Systems Id Quantique MagiQ Technologies","year":"0","key":"4"},{"journal-title":"Exchanging Secrets Without Using Cryptography","year":"0","author":"jafari","key":"9"},{"journal-title":"Rice University Wireless Open-access Research Platform (WARP)","year":"0","key":"8"}],"event":{"name":"IEEE INFOCOM 2013 - IEEE Conference on Computer Communications","start":{"date-parts":[[2013,4,14]]},"location":"Turin, Italy","end":{"date-parts":[[2013,4,19]]}},"container-title":["2013 Proceedings IEEE INFOCOM"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6556116\/6566708\/06567030.pdf?arnumber=6567030","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T17:14:47Z","timestamp":1498065287000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6567030\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/infcom.2013.6567030","relation":{},"subject":[],"published":{"date-parts":[[2013,4]]}}}