{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T08:48:15Z","timestamp":1725698895473},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1109\/milcom.2016.7795495","type":"proceedings-article","created":{"date-parts":[[2016,12,26]],"date-time":"2016-12-26T16:49:56Z","timestamp":1482770996000},"page":"1207-1212","source":"Crossref","is-referenced-by-count":2,"title":["Realizing physical layer authentication using constellation perturbation on a software-defined radio testbed"],"prefix":"10.1109","author":[{"given":"Ashwin","family":"Amanna","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Anu","family":"Saji","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"James","family":"Bohl","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Arun","family":"Subramanian","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref4","article-title":"Identity Management for Interoperable PTC Systems in Bandwidth-Limited Environments: The Final Report, Part 3 (of three parts) The Proposed Solution","author":"goel","year":"2014","journal-title":"Tech Rep"},{"key":"ref3","article-title":"SP 800&#x2013;107. Recommendation for Applications Using Approved Hash Algorithms","author":"dang","year":"2009","journal-title":"Tech Rep"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/5.4445"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1115\/JRC2011-56073"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TBC.2004.834027"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998428"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24091-1_61"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2009.0197"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/5.771068"}],"event":{"name":"MILCOM 2016 - 2016 IEEE Military Communications Conference (MILCOM)","start":{"date-parts":[[2016,11,1]]},"location":"Baltimore, MD, USA","end":{"date-parts":[[2016,11,3]]}},"container-title":["MILCOM 2016 - 2016 IEEE Military Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7784513\/7795145\/07795495.pdf?arnumber=7795495","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,1,10]],"date-time":"2017-01-10T19:31:55Z","timestamp":1484076715000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7795495\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/milcom.2016.7795495","relation":{},"subject":[],"published":{"date-parts":[[2016,11]]}}}