{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T10:09:38Z","timestamp":1755598178287,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/lcn.2018.8638248","type":"proceedings-article","created":{"date-parts":[[2019,2,12]],"date-time":"2019-02-12T01:55:48Z","timestamp":1549936548000},"page":"545-552","source":"Crossref","is-referenced-by-count":11,"title":["Improving Quantization for Channel Reciprocity based Key Generation"],"prefix":"10.1109","author":[{"given":"Paul","family":"Walther","sequence":"first","affiliation":[]},{"given":"Carsten","family":"Janda","sequence":"additional","affiliation":[]},{"given":"Elke","family":"Franz","sequence":"additional","affiliation":[]},{"given":"Mathias","family":"Pelka","sequence":"additional","affiliation":[]},{"given":"Horst","family":"Hellbruck","sequence":"additional","affiliation":[]},{"given":"Thorsten","family":"Strufe","sequence":"additional","affiliation":[]},{"given":"Eduard","family":"Jorswieck","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Fair comparison and evaluation of quantization schemes for phy-based key generation","author":"guillaume","year":"2014","journal-title":"Int OFDM Workshop"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1925861.1925870"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614356"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"3354","DOI":"10.1073\/pnas.1309933111","article-title":"Equitability, mutual information, and the maximal information coefficient","volume":"111","author":"kinney","year":"2014","journal-title":"Proceedings of the National Academy of Sciences of the USA"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/RWS.2010.5434259"},{"key":"ref15","first-page":"47","article-title":"Key generation from wireless channels","author":"lai","year":"2013","journal-title":"Security Wireless Communications at the Physical Layer"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567117"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409960"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/WAMICON.2006.351897"},{"journal-title":"Physical Layer Security in Wireless Communications","year":"2013","author":"zhou","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511977985"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2014.7063613"},{"key":"ref3","article-title":"An intuitive proof of the data processing inequality","author":"beaudry","year":"2011","journal-title":"arXiv [quant-ph]"},{"journal-title":"Elements of Information Theory","year":"2012","author":"cover","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2458316"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511841224"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1982.1056488"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ECWT.2005.1617683"},{"journal-title":"Pulse code communication","year":"1953","author":"gray","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/18.243431"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2011.5751298"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2001.985763"},{"journal-title":"The Scientist and Engineer&#x2019;S Guide to Digital Signal Processing","year":"1999","author":"smith","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2052253"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7120011"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2841113.2841117"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.902666"}],"event":{"name":"2018 IEEE 43rd Conference on Local Computer Networks (LCN)","start":{"date-parts":[[2018,10,1]]},"location":"Chicago, IL, USA","end":{"date-parts":[[2018,10,4]]}},"container-title":["2018 IEEE 43rd Conference on Local Computer Networks (LCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8635823\/8638025\/08638248.pdf?arnumber=8638248","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T03:25:12Z","timestamp":1643253912000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8638248\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/lcn.2018.8638248","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}