{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:00:49Z","timestamp":1771700449578,"version":"3.50.1"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,9]]},"DOI":"10.1109\/pimrc.2010.5671596","type":"proceedings-article","created":{"date-parts":[[2010,12,22]],"date-time":"2010-12-22T01:36:16Z","timestamp":1292981776000},"page":"1984-1989","source":"Crossref","is-referenced-by-count":17,"title":["Empirical analysis of UWB channel characteristics for secret key generation in indoor environments"],"prefix":"10.1109","author":[{"given":"Sana Tmar-Ben","family":"Hamida","sequence":"first","affiliation":[]},{"given":"Jean-Benoit","family":"Pierrot","sequence":"additional","affiliation":[]},{"given":"Claude","family":"Castelluccia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1","article-title":"Verification of Secret Key Generation from UWB Channel Observations","author":"madiseh","year":"2009","journal-title":"IEEE International Conference on Communications ICC"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISSPA.2005.1580281"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/APS.2007.4396852"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/0470869194"},{"key":"ref14","article-title":"On the effectiveness of secret key extraction from wireless signal strength in real environments","author":"suman","year":"2009","journal-title":"Proceedings of the 15th Annual International Conference on Mobile Computing and Networking"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1145\/1315245.1315295","article-title":"Robust key generation from signal envelopes in wireless networks","author":"azimi-sadjadi","year":"2007","journal-title":"Proceedings of the 14th CCS ACM conference"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.902666"},{"key":"ref6","first-page":"1","article-title":"High Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements","author":"patwari","year":"2009","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICCT.2006.341996"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1109\/NTMS.2009.5384826","article-title":"An Adaptive Quantization Algorithm for Secret Key Generation Using Radio Channel Measurements","author":"tmar-ben hamida","year":"2009","journal-title":"3rd International Conference on New Technologies Mobility and Security (NTMS)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.356"},{"key":"ref2","article-title":"Space-Time Wireless Channels","author":"durgin","year":"2002"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2004.830257"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2009.5073730"}],"event":{"name":"2010 IEEE 21st International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC 2010)","location":"Istanbul, Turkey","start":{"date-parts":[[2010,9,26]]},"end":{"date-parts":[[2010,9,30]]}},"container-title":["21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5656620\/5671569\/05671596.pdf?arnumber=5671596","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T17:31:31Z","timestamp":1497893491000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5671596\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,9]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/pimrc.2010.5671596","relation":{},"subject":[],"published":{"date-parts":[[2010,9]]}}}