{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:22:50Z","timestamp":1729632170377,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1109\/glocom.2008.ecp.356","type":"proceedings-article","created":{"date-parts":[[2010,12,8]],"date-time":"2010-12-08T09:51:12Z","timestamp":1291801872000},"page":"1-5","source":"Crossref","is-referenced-by-count":35,"title":["Secret Key Generation and Agreement in UWB Communication Channels"],"prefix":"10.1109","author":[{"given":"Masoud Ghoreishi","family":"Madiseh","sequence":"first","affiliation":[]},{"given":"Michael L.","family":"McGuire","sequence":"additional","affiliation":[]},{"given":"Stephen S.","family":"Neville","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Horie","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.808103"},{"key":"16","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1007\/11513988_27","article-title":"the avispa tool for the automated validation of internet security protocols and applications","volume":"3576","author":"armando","year":"2005","journal-title":"Proc Computer Aided Verification Lecture Notes in Computer Science"},{"year":"0","key":"13"},{"journal-title":"Error Control Systems for Digital Communication and Storage","year":"1995","author":"wicker","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/9780470546772"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1006\/dspr.1996.0023"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/18.243431"},{"year":"0","key":"1"},{"journal-title":"Channel Modeling Sub-Committee Report (Final)","year":"2003","author":"foerster","key":"10"},{"article-title":"key generation technique based on wireless channels charactristics","year":"2007","author":"ghoreishi madiseh","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/18.476316"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48285-7_35"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/UWBST.2002.1006320"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2004.830257"},{"key":"8","first-page":"175","article-title":"secret key extraction in ultra wideband channels for unsynchronized radios","author":"ghoreishi madiseh","year":"2008","journal-title":"Proc CNSR08 IEEE Computer Society Press"}],"event":{"name":"IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference","start":{"date-parts":[[2008,11,30]]},"location":"New Orleans, LA, USA","end":{"date-parts":[[2008,12,4]]}},"container-title":["IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4697774\/4697775\/04698131.pdf?arnumber=4698131","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T12:59:38Z","timestamp":1497877178000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4698131\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/glocom.2008.ecp.356","relation":{},"subject":[],"published":{"date-parts":[[2008]]}}}