{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T09:45:43Z","timestamp":1725615943881},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/icc.2014.6883407","type":"proceedings-article","created":{"date-parts":[[2014,9,3]],"date-time":"2014-09-03T14:10:33Z","timestamp":1409753433000},"page":"737-742","source":"Crossref","is-referenced-by-count":3,"title":["Bounds on secret key rates in fading channels under practical channel estimation schemes"],"prefix":"10.1109","author":[{"given":"Michael","family":"McGuire","sequence":"first","affiliation":[]},{"given":"Alireza","family":"Movahedian","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2007.382406"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2011.2160054"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2005.853104"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2003.810304"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2012.2227345"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1956.1056823"},{"journal-title":"Probability Random Variables and Random Signal Principles","year":"2001","author":"peebles","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5199564"},{"journal-title":"Information and Information Stability of Random Variables and Processes","year":"1964","author":"pinsker","key":"12"},{"journal-title":"A Decomposition of Block Toeplitz Matrices with Application to Vector Time Series","year":"2013","author":"sowell","key":"21"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.63"},{"journal-title":"Digital Spectral Analysis with Applications","year":"1987","author":"marple","key":"20"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1002\/ecjc.20167"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511977985"},{"key":"10","first-page":"261","article-title":"Secret key agreement techniques based on multipath propagation characteristics","author":"sasaoka","year":"2007","journal-title":"Securing Wireless Communications at the Physical Layer"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2012.6459916"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICUWB.2007.4380954"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2043187"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.902666"},{"journal-title":"Foundations of Mobile Radio Engineering","year":"1993","author":"yacoub","key":"9"},{"journal-title":"Mobile Radio Communications","year":"1992","author":"steele","key":"8"}],"event":{"name":"ICC 2014 - 2014 IEEE International Conference on Communications","start":{"date-parts":[[2014,6,10]]},"location":"Sydney, NSW","end":{"date-parts":[[2014,6,14]]}},"container-title":["2014 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6878057\/6883277\/06883407.pdf?arnumber=6883407","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,5]],"date-time":"2017-06-05T20:49:00Z","timestamp":1496695740000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6883407\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/icc.2014.6883407","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}