{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T16:48:32Z","timestamp":1770137312310,"version":"3.49.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T00:00:00Z","timestamp":1763078400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T00:00:00Z","timestamp":1763078400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,14]]},"DOI":"10.1109\/trustcom66490.2025.00130","type":"proceedings-article","created":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T20:42:41Z","timestamp":1770064961000},"page":"1127-1134","source":"Crossref","is-referenced-by-count":0,"title":["Establishing Secure Intra-Solid Communication Networks via Acoustic Transceivers"],"prefix":"10.1109","author":[{"given":"Chaoyi","family":"Sun","sequence":"first","affiliation":[{"name":"Huazhong University of Science and Technology,College of Life Science and Technology,WuHan,China"}]},{"given":"Henglin","family":"Pu","sequence":"additional","affiliation":[{"name":"Purdue University,School of Electrical and Computer Engineering,West Lafayette,IN,USA"}]},{"given":"Junyi","family":"Zhou","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology,School of Electronic Information and Communications,WuHan,China"}]},{"given":"Chao","family":"Cai","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology,College of Life Science and Technology,WuHan,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.03.016"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.12.006"},{"key":"ref3","volume-title":"The rf in RFID: uhf RFID in practice","author":"Dobkin","year":"2012"},{"key":"ref4","volume-title":"Classical electromagnetic radiation","author":"Heald","year":"2012"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1093\/nsr\/nwx154"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/s0065-3454(05)35004-2"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.32604\/sv.2019.03783"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IUS46767.2020.9251623"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2018.2839558"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544261"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TUFFC.2021.3129822"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3331743"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/OJAP.2022.3168400"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16649-0_15"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/572861"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-009-0183-0"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2023.3305755"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1117\/12.2662797"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2019.2939704"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/IECON51785.2023.10312243"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MetroInd4.0IoT61288.2024.10584211"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3390\/s20113304"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TUFFC.2019.2949467"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1121\/1.4916275"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/c2009-0-30467-5"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3051665"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-91651-4_3"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-01673-8"}],"event":{"name":"2025 IEEE 24th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","location":"Guiyang, China","start":{"date-parts":[[2025,11,14]]},"end":{"date-parts":[[2025,11,17]]}},"container-title":["2025 IEEE 24th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11354467\/11354567\/11354873.pdf?arnumber=11354873","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T05:58:34Z","timestamp":1770098314000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11354873\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,14]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/trustcom66490.2025.00130","relation":{},"subject":[],"published":{"date-parts":[[2025,11,14]]}}}