{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:20:05Z","timestamp":1729624805576,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,4]]},"DOI":"10.1109\/wcnc.2010.5506131","type":"proceedings-article","created":{"date-parts":[[2010,7,20]],"date-time":"2010-07-20T14:48:08Z","timestamp":1279637288000},"page":"1-6","source":"Crossref","is-referenced-by-count":13,"title":["Slepian-Wolf Coding for Reconciliation of Physical Layer Secret Keys"],"prefix":"10.1109","author":[{"given":"Xiaojun","family":"Sun","sequence":"first","affiliation":[]},{"given":"Xiaofu","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Chunming","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Xu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1","article-title":"Secure physical layer key generation schemes:performance and information theoretic limits","author":"wallace","year":"2009","journal-title":"Proc IEEE ICC"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/ecjc.20167"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1145\/1315245.1315295","article-title":"Robust key generation from signal envelopes in wireless networks","author":"azimi-sadjadi","year":"2007","journal-title":"Proc ACM Conference on Computer and Communications Security"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409960"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921908"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2006.1633793"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2006.261991"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s001459900023"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1973.1055037"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1974.1055171"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/T-WC.2008.070482"},{"key":"ref4","first-page":"3013","article-title":"secure wireless communications: secret keys through multipath","author":"sayeed","year":"2008","journal-title":"Proc IEEE ICASSP"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.904983"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/4234.824754"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.902666"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.831778"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SARNOF.2006.4534731"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2006.262101"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.356"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1006\/dspr.1996.0023"},{"key":"ref9","first-page":"2030","article-title":"On the secrecy capabilities of ITU channels","author":"ye","year":"2007","journal-title":"Proc IEEE VTC-Fall"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"journal-title":"Probability Distributions Involving Gaussian Random Variables","year":"2006","author":"simon","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2008.4595400"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1109\/LCOMM.2002.804244","article-title":"Compression of binary sources with side information at the decoder using LDPC codes","volume":"6","author":"angelos","year":"2002","journal-title":"IEEE Commun Lett"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2008.060006"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2007.4298397"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.850230"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.070205"}],"event":{"name":"Networking Conference (WCNC)","start":{"date-parts":[[2010,4,18]]},"location":"Sydney, Australia","end":{"date-parts":[[2010,4,21]]}},"container-title":["2010 IEEE Wireless Communication and Networking Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5504893\/5506094\/05506131.pdf?arnumber=5506131","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T07:08:08Z","timestamp":1497856088000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5506131\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,4]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/wcnc.2010.5506131","relation":{},"subject":[],"published":{"date-parts":[[2010,4]]}}}