{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T11:00:40Z","timestamp":1725620440042},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,26]]},"DOI":"10.1145\/2093698.2093851","type":"proceedings-article","created":{"date-parts":[[2012,1,17]],"date-time":"2012-01-17T17:20:41Z","timestamp":1326820841000},"page":"1-6","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Reliable symmetric key generation for body area networks using wireless physical layer security in the presence of an on-body eavesdropper"],"prefix":"10.1145","author":[{"given":"Gill R.","family":"Tsouri","sequence":"first","affiliation":[{"name":"Rochester Institute of Technology, Rochester, NY"}]},{"given":"Jeff","family":"Wilczewski","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology, Rochester, NY"}]}],"member":"320","published-online":{"date-parts":[[2011,10,26]]},"reference":[{"volume-title":"Springer-Verlag","year":"2002","author":"Daemen J.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2006.16"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921908"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.928990"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.902666"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/4234.824754"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2043187"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2052253"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/437824"},{"volume-title":"Springer","year":"2008","author":"Robshaw M.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.BODYNETS2009.5941"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/EUC.2010.103"},{"key":"e_1_3_2_1_15_1","unstructured":"A. Rukhin J. Soto J Nechvatal M. Smid E. Barker S. Leigh M. Levenson M. Vangel D. Banks A. Heckert J. Dray S. Vo \"A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications \" Aug. 2008. A. Rukhin J. Soto J Nechvatal M. Smid E. Barker S. Leigh M. Levenson M. Vangel D. Banks A. Heckert J. Dray S. Vo \"A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications \" Aug. 2008."},{"key":"e_1_3_2_1_16_1","unstructured":"G. D. Durgin Space-Time Wireless Channels Prentice Hall 2002. G. D. Durgin Space-Time Wireless Channels Prentice Hall 2002."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.070194"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1049\/el:20040386"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2009.2014525"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/T-WC.2009.070788"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2010.08.100673"}],"event":{"name":"ISABEL '11: International Symposium on Applied Sciences in Biomedical and Communication Technologies","sponsor":["Universitat Pompeu Fabra","IEEE","Technical University of Catalonia Spain Technical University of Catalonia (UPC), Spain","River Publishers River Publishers","CTTC Technological Center for Telecommunications of Catalonia","CTIF Kyranova Ltd, Center for TeleInFrastruktur"],"location":"Barcelona Spain","acronym":"ISABEL '11"},"container-title":["Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2093698.2093851","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T23:28:17Z","timestamp":1673566097000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2093698.2093851"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,26]]},"references-count":21,"alternative-id":["10.1145\/2093698.2093851","10.1145\/2093698"],"URL":"https:\/\/doi.org\/10.1145\/2093698.2093851","relation":{},"subject":[],"published":{"date-parts":[[2011,10,26]]},"assertion":[{"value":"2011-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}