{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:17:11Z","timestamp":1759331831941,"version":"3.37.3"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-17-1-0581"],"award-info":[{"award-number":["W911NF-17-1-0581"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000005","name":"U.S. Department of Defense","doi-asserted-by":"publisher","award":["W911NF-20-2-0267"],"award-info":[{"award-number":["W911NF-20-2-0267"]}],"id":[{"id":"10.13039\/100000005","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Signal Process. Lett."],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/lsp.2022.3184253","type":"journal-article","created":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T20:19:31Z","timestamp":1655756371000},"page":"1497-1501","source":"Crossref","is-referenced-by-count":6,"title":["Secret Key Generation by Continuous Encryption Before Quantization"],"prefix":"10.1109","volume":"29","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4026-0726","authenticated-orcid":false,"given":"Ahmed","family":"Maksud","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of California at Riverside, Riverside, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6843-8223","authenticated-orcid":false,"given":"Yingbo","family":"Hua","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of California at Riverside, Riverside, CA, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409960"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2052253"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.63"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.06.014"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2521718"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2018.2814607"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2837661"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2888553"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2974621"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3060438"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3084361"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3127021"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.808103"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.902666"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2008.4518284"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.88"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.114"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP49889.2020.9299743"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3026466"},{"volume":"197","article-title":"Advanced encryption standard (AES)","year":"2001","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2007.903538"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/579416"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2010.5634538"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.2434151"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2753172"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2020.2981673"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2098872"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2019.2929467"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2022.3145676"},{"article-title":"Continuous encryption functions for security over networks","year":"2021","author":"Hua","key":"ref30"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9053663"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC48557.2020.9154267"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-22r1a"}],"container-title":["IEEE Signal Processing Letters"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/97\/9686799\/9800701-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/97\/9686799\/09800701.pdf?arnumber=9800701","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T04:36:38Z","timestamp":1706762198000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9800701\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/lsp.2022.3184253","relation":{},"ISSN":["1070-9908","1558-2361"],"issn-type":[{"type":"print","value":"1070-9908"},{"type":"electronic","value":"1558-2361"}],"subject":[],"published":{"date-parts":[[2022]]}}}