{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T10:03:45Z","timestamp":1730196225684,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,9]]},"DOI":"10.1109\/allerton.2009.5394934","type":"proceedings-article","created":{"date-parts":[[2010,1,26]],"date-time":"2010-01-26T17:35:50Z","timestamp":1264527350000},"page":"754-761","source":"Crossref","is-referenced-by-count":6,"title":["A note on information-theoretic secret key exchange over wireless channels"],"prefix":"10.1109","author":[{"given":"Murtaza A.","family":"Zafer","sequence":"first","affiliation":[]},{"given":"Dakshi","family":"Agrawal","sequence":"additional","affiliation":[]},{"given":"Mudhakar","family":"Srivatsa","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2006.283582"},{"key":"ref12","first-page":"42","article-title":"An overview of public key cryptography","author":"martin","year":"2002","journal-title":"IEEE Communications Magazine"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.820010"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/APS.2004.1330415"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921861"},{"journal-title":"Proceedings of the Allerton Conference","article-title":"The mimome channel","year":"2007","author":"khisti","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1464420.1464426"},{"journal-title":"Conference on Information sciences and systems CISS","article-title":"A randomized space-time transmission scheme for secret-key agreement","year":"2005","author":"li","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2007.4298439"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.1003822"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921908"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511807213"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/18.476316"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055892"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398521"},{"journal-title":"Advances in Cryptology - CRYPTO","article-title":"Robust fuzzy extractors and authenticated key agreement from close secrets","year":"2006","author":"dodis","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/18.243431"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1137\/060651380"},{"journal-title":"ACM Conf on Computer and Communication Security","article-title":"Robust key generation from signal envelopes in wireless networks","year":"2007","author":"a-sadjadi","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48658-5_26"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.808103"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"ref23","first-page":"47","article-title":"Identity-based cryptosystems and signature schemes","volume":"196","author":"shamir","year":"1984","journal-title":"Advances in Cryptology Proc Crypto'84"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.9"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1973.1055037"}],"event":{"name":"2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","start":{"date-parts":[[2009,9,30]]},"location":"Monticello, IL, USA","end":{"date-parts":[[2009,10,2]]}},"container-title":["2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5375733\/5394483\/05394934.pdf?arnumber=5394934","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,19]],"date-time":"2017-03-19T00:28:54Z","timestamp":1489883334000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5394934\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,9]]},"references-count":28,"URL":"http:\/\/dx.doi.org\/10.1109\/allerton.2009.5394934","relation":{},"subject":[],"published":{"date-parts":[[2009,9]]}}}