{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:28:40Z","timestamp":1750307320909,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,4,10]],"date-time":"2011-04-10T00:00:00Z","timestamp":1302393600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-0831366"],"award-info":[{"award-number":["CNS-0831366"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,4,10]]},"DOI":"10.1145\/1972551.1972559","type":"proceedings-article","created":{"date-parts":[[2011,5,3]],"date-time":"2011-05-03T12:48:54Z","timestamp":1304426934000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":58,"title":["On passive inference attacks against physical-layer key extraction?"],"prefix":"10.1145","author":[{"given":"Matthew","family":"Edman","sequence":"first","affiliation":[{"name":"Rensselaer Polytechnic Institute"}]},{"given":"Aggelos","family":"Kiayias","sequence":"additional","affiliation":[{"name":"University of Connecticut"}]},{"given":"B\u00fclent","family":"Yener","sequence":"additional","affiliation":[{"name":"Rensselaer Polytechnic Institute"}]}],"member":"320","published-online":{"date-parts":[[2011,4,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2005.858853"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315295"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/188307.188368"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEAA.2010.5652964"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1006\/dspr.1996.0023"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/26.385951"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614356"},{"key":"e_1_3_2_1_8_1","volume-title":"A scheme of private key agreement based on the channel characteristics in ofdm land mobile radio. Eletronics and Communications in Japan, Part 3 (Fundamental Electronic Science), 88(9):1--10","author":"Kitaura A.","year":"2005","unstructured":"A. Kitaura and H. Sasaoka . A scheme of private key agreement based on the channel characteristics in ofdm land mobile radio. Eletronics and Communications in Japan, Part 3 (Fundamental Electronic Science), 88(9):1--10 , 2005 . A. Kitaura and H. Sasaoka. A scheme of private key agreement based on the channel characteristics in ofdm land mobile radio. Eletronics and Communications in Japan, Part 3 (Fundamental Electronic Science), 88(9):1--10, 2005."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1161289.1161297"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409960"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/EUMC.2005.1608780"},{"key":"e_1_3_2_1_12_1","volume-title":"Digital Signal Processing","author":"Proakis J. G.","year":"2007","unstructured":"J. G. Proakis and D. G. Manolakis . Digital Signal Processing . Pearson Prentice Hall , fourth edition, 2007 . J. G. Proakis and D. G. Manolakis. Digital Signal Processing. Pearson Prentice Hall, fourth edition, 2007."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2001.985763"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921689"},{"key":"e_1_3_2_1_15_1","volume-title":"Annual Conference of ITA (ACITA) 2009","author":"Zafer M. A.","year":"2009","unstructured":"M. A. Zafer , D. Agrawal , and M. Srivatsa . Bootstrapping coalition manets: Physical-layer security under active adversary . In Annual Conference of ITA (ACITA) 2009 , 2009 . M. A. Zafer, D. Agrawal, and M. Srivatsa. Bootstrapping coalition manets: Physical-layer security under active adversary. In Annual Conference of ITA (ACITA) 2009, 2009."}],"event":{"name":"EuroSys '11: Sixth EuroSys Conference 2011","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Salzburg Austria","acronym":"EuroSys '11"},"container-title":["Proceedings of the Fourth European Workshop on System Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1972551.1972559","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1972551.1972559","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:05:54Z","timestamp":1750244754000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1972551.1972559"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4,10]]},"references-count":15,"alternative-id":["10.1145\/1972551.1972559","10.1145\/1972551"],"URL":"https:\/\/doi.org\/10.1145\/1972551.1972559","relation":{},"subject":[],"published":{"date-parts":[[2011,4,10]]},"assertion":[{"value":"2011-04-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}