{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:22:16Z","timestamp":1750306936689,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,29]],"date-time":"2012-10-29T00:00:00Z","timestamp":1351468800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000181","name":"Air Force Office of Scientific Research","doi-asserted-by":"publisher","award":["FA9550-09-064"],"award-info":[{"award-number":["FA9550-09-064"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000781","name":"European Research Council","doi-asserted-by":"publisher","award":["ERC-2009-StG-240317"],"award-info":[{"award-number":["ERC-2009-StG-240317"]}],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,29]]},"DOI":"10.1145\/2390231.2390244","type":"proceedings-article","created":{"date-parts":[[2012,11,7]],"date-time":"2012-11-07T16:42:56Z","timestamp":1352306576000},"page":"73-78","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Creating shared secrets out of thin air"],"prefix":"10.1145","author":[{"given":"Iris","family":"Safaka","sequence":"first","affiliation":[{"name":"Computer and Communication Sciences, EPFL, Switzerland"}]},{"given":"Christina","family":"Fragouli","sequence":"additional","affiliation":[{"name":"Computer and Communication Sciences, EPFL, Switzerland"}]},{"given":"Katerina","family":"Argyraki","sequence":"additional","affiliation":[{"name":"Computer and Communication Sciences, EPFL, Switzerland"}]},{"given":"Suhas","family":"Diggavi","sequence":"additional","affiliation":[{"name":"Electrical Engineering, UCLA, CA"}]}],"member":"320","published-online":{"date-parts":[[2012,10,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"key":"e_1_3_2_1_4_1","volume-title":"Secure Wireless Communication with Dynamic Secrets,\" in Proceedings of the IEEE INFOCOM Conference","author":"Xiao S.","year":"2010","unstructured":"S. Xiao , W. Gong , and D. Towsley , \" Secure Wireless Communication with Dynamic Secrets,\" in Proceedings of the IEEE INFOCOM Conference , 2010 . S. Xiao, W. Gong, and D. Towsley, \"Secure Wireless Communication with Dynamic Secrets,\" in Proceedings of the IEEE INFOCOM Conference, 2010."},{"key":"e_1_3_2_1_5_1","volume-title":"High Speed Quantum Key Distribution System Supports One-time Pad Encryption of Real-time Video,\" in Proceedings of SPIE","author":"Mink A.","year":"2006","unstructured":"A. Mink , X. Tang , L. Ma , T. Nakassis , B. Hershman , J. C. Bienfang , D. Su , R. Boisvert , C. W. Clark , and C. J. Williams , \" High Speed Quantum Key Distribution System Supports One-time Pad Encryption of Real-time Video,\" in Proceedings of SPIE , vol. 6244 , 2006 . A. Mink, X. Tang, L. Ma, T. Nakassis, B. Hershman, J. C. Bienfang, D. Su, R. Boisvert, C. W. Clark, and C. J. Williams, \"High Speed Quantum Key Distribution System Supports One-time Pad Encryption of Real-time Video,\" in Proceedings of SPIE, vol. 6244, 2006."},{"key":"e_1_3_2_1_6_1","unstructured":"\"The On-demand Video Consumer\" Survey 2012 http:\/\/www.youtube.com\/yt\/advertise\/research.html.  \"The On-demand Video Consumer\" Survey 2012 http:\/\/www.youtube.com\/yt\/advertise\/research.html."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.929914"},{"key":"e_1_3_2_1_8_1","volume-title":"Physical Layer Wireless Security Made Fast and Channel Independent,\" in Proceedings of the IEEE INFOCOM Conference","author":"Gollakota S.","year":"2011","unstructured":"S. Gollakota and D. Katabi , \" Physical Layer Wireless Security Made Fast and Channel Independent,\" in Proceedings of the IEEE INFOCOM Conference , 2011 . S. Gollakota and D. Katabi, \"Physical Layer Wireless Security Made Fast and Channel Independent,\" in Proceedings of the IEEE INFOCOM Conference, 2011."},{"key":"e_1_3_2_1_10_1","unstructured":"F. J. Macwilliams and N. J. A. Sloane \"The Theory of Error Correcting Codes \" North-Holland 2006.  F. J. Macwilliams and N. J. A. Sloane \"The Theory of Error Correcting Codes \" North-Holland 2006."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315295"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2043187"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1791212.1791222"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614356"}],"event":{"name":"HotNets-XI: 11th ACM Workshop on Hot Topics in Networks","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Redmond Washington","acronym":"HotNets-XI"},"container-title":["Proceedings of the 11th ACM Workshop on Hot Topics in Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2390231.2390244","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2390231.2390244","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:35:45Z","timestamp":1750235745000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2390231.2390244"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,29]]},"references-count":13,"alternative-id":["10.1145\/2390231.2390244","10.1145\/2390231"],"URL":"https:\/\/doi.org\/10.1145\/2390231.2390244","relation":{},"subject":[],"published":{"date-parts":[[2012,10,29]]},"assertion":[{"value":"2012-10-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}