{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:31:23Z","timestamp":1729614683592,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/cse.2014.264","type":"proceedings-article","created":{"date-parts":[[2015,2,5]],"date-time":"2015-02-05T17:18:03Z","timestamp":1423156683000},"page":"1396-1403","source":"Crossref","is-referenced-by-count":16,"title":["A Secret Key Extraction Technique Applied in Vehicular Networks"],"prefix":"10.1109","author":[{"given":"Abdeldime M.S.","family":"Abdelgader","sequence":"first","affiliation":[]},{"given":"Lenan","family":"Wu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ISWPC.2006.1613601"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"2036","DOI":"10.1109\/VETECS.2008.458","article-title":"IEEE 802.11 p: Towards an international standard for wireless access in vehicular environments","author":"jiang","year":"2008","journal-title":"IEEE Vehicular Technology Conference 2008 VTC Spring 2008"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2541289"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1145\/1315245.1315295","article-title":"Robust key generation from signal envelopes in wireless networks","author":"azimi-sadjadi","year":"2007","journal-title":"Proceedings of the 14th ACM conference on Computer and Communications Security"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409960"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614356"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2005.858853"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48285-7_35"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/73007.73009"},{"article-title":"Space-time wireless channels","year":"2003","author":"durgin","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.1998.708986"},{"article-title":"On the secrecy capabilities of ITU channels","year":"2007","author":"ye","key":"ref19","doi-asserted-by":"crossref","DOI":"10.1109\/VETECF.2007.426"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2001.985763"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"2790","DOI":"10.1016\/j.comcom.2007.12.009","article-title":"A mechanism to enforce privacy in vehicle-to-infrastructure communication","volume":"31","author":"cencioni","year":"2008","journal-title":"Computer Communications"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409959"},{"key":"ref3","first-page":"223","article-title":"Key management in vehicular ad-hoc networks","author":"fu","year":"2008","journal-title":"2008 IEEE International Conference on Electro\/Information Technology"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/11767831_13"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1007\/978-3-540-24676-3_31","article-title":"Fuzzy extractors: How to generate strong keys from biometrics and other noisy data","author":"dodis","year":"2004","journal-title":"Advances in Cryptology-EUROCRYPT 2004"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.01.009"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/BF00191318"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2007.4454834"},{"key":"ref2","first-page":"301","article-title":"Vanet: Security attacks and its possible solutions","volume":"3","author":"rawat","year":"2012","journal-title":"Journal of Information and Operations Management"},{"journal-title":"Scientific American","article-title":"Election fix? switzerland tests quantum cryptography","year":"2007","author":"greenemeier","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/IConAC.2014.6935482"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"3013","DOI":"10.1109\/ICASSP.2008.4518284","article-title":"Secure wireless communications: Secret keys through multipath","author":"sayeed","year":"2008","journal-title":"in Acoustics Speech and Signal Processing 2008 ICASSP 2008 IEEE International Conference on"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921908"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2006.262101"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2010.5506543"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1109\/TIFS.2010.2043187","article-title":"Information-theoretically secret key generation for fading wireless channels","volume":"5","author":"ye","year":"2010","journal-title":"Information Forensics and Security IEEE Transactions"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/26.3776"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.88"}],"event":{"name":"2014 IEEE 17th International Conference on Computational Science and Engineering (CSE)","start":{"date-parts":[[2014,12,19]]},"location":"Chengdu, China","end":{"date-parts":[[2014,12,21]]}},"container-title":["2014 IEEE 17th International Conference on Computational Science and Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7023220\/7023510\/07023774.pdf?arnumber=7023774","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T05:01:12Z","timestamp":1498194072000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7023774\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/cse.2014.264","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}