{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:41:46Z","timestamp":1729676506264,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/icc.2017.7996847","type":"proceedings-article","created":{"date-parts":[[2017,7,31]],"date-time":"2017-07-31T20:39:10Z","timestamp":1501533550000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["AE-shelter: An novel anti-eavesdropping scheme in wireless networks"],"prefix":"10.1109","author":[{"given":"Xuran","family":"Li","sequence":"first","affiliation":[]},{"given":"Hong-Ning","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Qiu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Athanasios V.","family":"Vasilakos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7120014"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2543687"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2111370"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2248371.2248383"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-015-0935-y"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2016.7841849"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.jnt.2007.05.005","article-title":"Cyclic polygons with rational sides and area","volume":"128","author":"macdougall","year":"2008","journal-title":"Journal of Number Theory"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.052213.00000"},{"journal-title":"Statistical Distributions","year":"2000","author":"evans","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2014.2317740"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JIOT.2016.2631520","article-title":"Leveraging crowdsourcing for efficient malicious users detection in large-scale social networks","volume":"pp","author":"yang","year":"2016","journal-title":"IEEE Internet of Things Journal"},{"journal-title":"USENIX Symposium on Networked Systems Design and Implementation (NSDI)","article-title":"Securing rfids by randomizing the modulation and channel","year":"0","author":"hassanieh","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2418316"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600690CM"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2552146"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7263345"},{"key":"ref2","first-page":"237","article-title":"Gone in 360 seconds: Hijacking with hitag2","author":"verdult","year":"0","journal-title":"Presented as part of the 21st USENIX Security Symposium (USENIX Security 12)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2558521"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2011.5999759"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2013.2241092"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2007.70759"},{"journal-title":"Encyclopedia of Mathematics and its Applications","year":"1999","author":"andrews","key":"ref21"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2011.100411.100541"}],"event":{"name":"ICC 2017 - 2017 IEEE International Conference on Communications","start":{"date-parts":[[2017,5,21]]},"location":"Paris, France","end":{"date-parts":[[2017,5,25]]}},"container-title":["2017 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7985734\/7996317\/07996847.pdf?arnumber=7996847","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T21:27:43Z","timestamp":1569965263000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7996847\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icc.2017.7996847","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}