{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T05:24:42Z","timestamp":1778304282343,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,8]],"date-time":"2020-07-08T00:00:00Z","timestamp":1594166400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Cisco Systems"},{"name":"Center for Selective C-H Functionalization, National Science Foundation","award":["CNS-1923782, CNS-1827940, CNS-1824529, CNS-1801857, CNS-1801865, CNS-1518916"],"award-info":[{"award-number":["CNS-1923782, CNS-1827940, CNS-1824529, CNS-1801857, CNS-1801865, CNS-1518916"]}]},{"DOI":"10.13039\/100010198","name":"Army Research Laboratory","doi-asserted-by":"publisher","award":["W911NF-1920269"],"award-info":[{"award-number":["W911NF-1920269"]}],"id":[{"id":"10.13039\/100010198","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100002418","name":"Intel Corporation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100002418","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,8]]},"DOI":"10.1145\/3395351.3399365","type":"proceedings-article","created":{"date-parts":[[2020,7,22]],"date-time":"2020-07-22T04:29:10Z","timestamp":1595392150000},"page":"317-327","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["Security in terahertz WLANs with Leaky wave antennas"],"prefix":"10.1145","author":[{"given":"Chia-Yi","family":"Yeh","sequence":"first","affiliation":[{"name":"Rice University"}]},{"given":"Yasaman","family":"Ghasempour","sequence":"additional","affiliation":[{"name":"Rice University"}]},{"given":"Yasith","family":"Amarasinghe","sequence":"additional","affiliation":[{"name":"Brown University"}]},{"given":"Daniel M.","family":"Mittleman","sequence":"additional","affiliation":[{"name":"Brown University"}]},{"given":"Edward W.","family":"Knightly","sequence":"additional","affiliation":[{"name":"Rice University"}]}],"member":"320","published-online":{"date-parts":[[2020,7,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2014.01.006"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1515\/eletel-2016-0001"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2801073.2801075"},{"key":"e_1_3_2_1_4_1","unstructured":"U.S. Federal Communications Commission. 2019. FCC Opens Spectrum Horizons for New Services & Technologies. https:\/\/www.fcc.gov\/document\/fcc-opens-spectrum-horizons-new-services-technologies  U.S. Federal Communications Commission. 2019. FCC Opens Spectrum Horizons for New Services & Technologies. https:\/\/www.fcc.gov\/document\/fcc-opens-spectrum-horizons-new-services-technologies"},{"key":"e_1_3_2_1_5_1","volume-title":"Radiocommunication Conference. 2019","author":"World","year":"2019","unstructured":"World Radiocommunication Conference. 2019 . Resolution 731: Consideration of Sharing and Adjacent-Band Compatibility between Passive and Active Services above 71 GHz. https:\/\/www.itu.int\/en\/ITU-R\/conferences\/wrc\/ 2019 \/Documents\/PFA-WRC19-E.pdf World Radiocommunication Conference. 2019. Resolution 731: Consideration of Sharing and Adjacent-Band Compatibility between Passive and Active Services above 71 GHz. https:\/\/www.itu.int\/en\/ITU-R\/conferences\/wrc\/2019\/Documents\/PFA-WRC19-E.pdf"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055892"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1038\/nphoton.2009.206"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1063\/1.3386413"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1002\/adom.201900628"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-020-15761-4"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372224.3380895"},{"key":"e_1_3_2_1_12_1","volume-title":"Frontiers in Antennas: Next Generation Design & Engineering","author":"Gross Frank","unstructured":"Frank Gross . 2010. Frontiers in Antennas: Next Generation Design & Engineering . McGraw Hill Professional . Frank Gross. 2010. Frontiers in Antennas: Next Generation Design & Engineering. McGraw Hill Professional."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMTT.2009.2034223"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1063\/1.5011063"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2011.081011.100545"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1038\/nphoton.2015.176"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10762-010-9758-1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1038\/nphoton.2013.275"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055917"},{"key":"e_1_3_2_1_20_1","volume-title":"Securing Wireless Communications at the Physical Layer","author":"Li Zang","unstructured":"Zang Li , Roy Yates , and Wade Trappe . 2010. Secrecy Capacity of Independent Parallel Channels . In Securing Wireless Communications at the Physical Layer . Springer US , Boston, MA , 1--18. Zang Li, Roy Yates, and Wade Trappe. 2010. Secrecy Capacity of Independent Parallel Channels. In Securing Wireless Communications at the Physical Layer. Springer US, Boston, MA, 1--18."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-017-00877-x"},{"key":"e_1_3_2_1_22_1","volume-title":"Josep Miquel Jornet, and Daniel M Mittleman","author":"Ma Jianjun","year":"2018","unstructured":"Jianjun Ma , Rabi Shrestha , Jacob Adelberg , Chia-Yi Yeh , Zahed Hossain , Edward Knightly , Josep Miquel Jornet, and Daniel M Mittleman . 2018 . Security and Eavesdropping in Terahertz Wireless Links. Nature 563, 7729 (2018), 89--93. Jianjun Ma, Rabi Shrestha, Jacob Adelberg, Chia-Yi Yeh, Zahed Hossain, Edward Knightly, Josep Miquel Jornet, and Daniel M Mittleman. 2018. Security and Eavesdropping in Terahertz Wireless Links. Nature 563, 7729 (2018), 89--93."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1364\/JOSAB.26.0000A6"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1063\/1.5007683"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7996402"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2712878"},{"key":"e_1_3_2_1_27_1","first-page":"60","article-title":"Low-Profile Terahertz Radar Based on Broadband Leaky-Wave Beam Steering","volume":"7","author":"Murano Kosuke","year":"2016","unstructured":"Kosuke Murano , Issei Watanabe , Akifumi Kasamatsu , Safumi Suzuki , Masahiro Asada , Withawat Withayachumnankul , Toshiyuki Tanaka , and Yasuaki Monnai . 2016 . Low-Profile Terahertz Radar Based on Broadband Leaky-Wave Beam Steering . IEEE Transactions on Terahertz Science and Technology 7 , 1 (2016), 60 -- 69 . Kosuke Murano, Issei Watanabe, Akifumi Kasamatsu, Safumi Suzuki, Masahiro Asada, Withawat Withayachumnankul, Toshiyuki Tanaka, and Yasuaki Monnai. 2016. Low-Profile Terahertz Radar Based on Broadband Leaky-Wave Beam Steering. IEEE Transactions on Terahertz Science and Technology 7, 1 (2016), 60--69.","journal-title":"IEEE Transactions on Terahertz Science and Technology"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1364\/OE.21.023736"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346844"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MAP.2008.4653700"},{"key":"e_1_3_2_1_31_1","unstructured":"Wade Trappe and Lawrence C Washington. 2006. Introduction to Cryptography with Coding Theory. Pearson.  Wade Trappe and Lawrence C Washington. 2006. Introduction to Cryptography with Coding Theory. Pearson."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2562010"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC.2014.6941328"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2825138"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2676087"}],"event":{"name":"WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks","location":"Linz Austria","acronym":"WiSec '20","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3395351.3399365","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3395351.3399365","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3395351.3399365","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:34Z","timestamp":1750199914000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3395351.3399365"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,8]]},"references-count":36,"alternative-id":["10.1145\/3395351.3399365","10.1145\/3395351"],"URL":"https:\/\/doi.org\/10.1145\/3395351.3399365","relation":{},"subject":[],"published":{"date-parts":[[2020,7,8]]},"assertion":[{"value":"2020-07-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}