{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T20:08:12Z","timestamp":1725480492211},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540691723"},{"type":"electronic","value":"9783540691730"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11964254_11","type":"book-chapter","created":{"date-parts":[[2007,2,26]],"date-time":"2007-02-26T11:17:55Z","timestamp":1172488675000},"page":"113-120","source":"Crossref","is-referenced-by-count":2,"title":["On the Wiretap Channel Induced by Noisy Tags"],"prefix":"10.1007","author":[{"given":"Julien","family":"Bringer","sequence":"first","affiliation":[]},{"given":"Herv\u00e9","family":"Chabanne","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"9","key":"11_CR1","doi-asserted-by":"publisher","first-page":"2010","DOI":"10.1109\/TIT.2004.833352","volume":"50","author":"L. Bazzi","year":"2004","unstructured":"Bazzi, L., Richardson, T.J., Urbanke, R.L.: Exact thresholds and optimal codes for the binary-symmetric channel and gallager\u2019s decoding algorithm A. IEEE Transactions on Information Theory\u00a050(9), 2010\u20132021 (2004)","journal-title":"IEEE Transactions on Information Theory"},{"key":"11_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/11733447_21","volume-title":"Smart Card Research and Advanced Applications","author":"C. Castelluccia","year":"2006","unstructured":"Castelluccia, C., Avoine, G.: Noisy tags: A pretty good key exchange protocol for RFID tags. In: Domingo-Ferrer, J., Posegga, J., Schreckling, D. (eds.) CARDIS 2006. LNCS, vol.\u00a03928, pp. 289\u2013299. Springer, Heidelberg (2006)"},{"key":"11_CR3","series-title":"Research monograph series","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4347.001.0001","volume-title":"Low-Density Parity Check Codes","author":"R.G. Gallager","year":"1963","unstructured":"Gallager, R.G.: Low-Density Parity Check Codes. Research monograph series, vol.\u00a021. MIT Press, Cambridge (1963)"},{"issue":"3","key":"11_CR4","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MSP.2005.78","volume":"3","author":"S.L. Garfinkel","year":"2005","unstructured":"Garfinkel, S.L., Juels, A., Pappu, R.: RFID Privacy: An Overview of Problems and Proposed Solutions. IEEE Security & Privacy\u00a03(3), 34\u201343 (2005)","journal-title":"IEEE Security & Privacy"},{"key":"11_CR5","first-page":"210","volume-title":"Conference on Computer and Communications Security \u2013 ACM CCS","author":"D. Molnar","year":"2004","unstructured":"Molnar, D., Wagner, D.: Privacy and security in library RFID: Issues, practices, and architectures. In: Pfitzmann, B., Liu, P. (eds.) Conference on Computer and Communications Security \u2013 ACM CCS, Washington, DC, USA, pp. 210\u2013219. ACM Press, New York (2004)"},{"key":"11_CR6","unstructured":"Oren, Y., Shamir, A.: Power analysis of RFID tags (2006), http:\/\/www.wisdom.weizmann.ac.il\/~yossio\/rfid\/"},{"issue":"10","key":"11_CR7","first-page":"2135","volume":"63","author":"L.H. Ozarow","year":"1984","unstructured":"Ozarow, L.H., Wyner, A.D.: Wire\u2013tap channel II. The Bell System Technical Journal\u00a063(10), 2135\u20132157 (1984)","journal-title":"The Bell System Technical Journal"},{"issue":"2","key":"11_CR8","doi-asserted-by":"publisher","first-page":"638","DOI":"10.1109\/18.910579","volume":"47","author":"T..J. Richardson","year":"2001","unstructured":"Richardson, T.J., Urbanke, R.L.: Efficient encoding of low-density parity-check codes. IEEE Transactions on Information Theory\u00a047(2), 638\u2013656 (2001)","journal-title":"IEEE Transactions on Information Theory"},{"key":"11_CR9","unstructured":"Smarandache, R., Vontobel, P.O.: On regular quasi-cyclic LDPC codes from binomials. In: Proceedings of IEEE International Symposium on Information Theory, Chicago, IL, USA, June 27\u2013July 2, p. 274 (2004)"},{"key":"11_CR10","unstructured":"Thangaraj, A., Dihidar, S., Calderbank, A.R., McLaughlin, S.W., Merolla, J.-M.: On the application of LDPC codes to a novel wiretap channel inspired by quantum key distribution. arXiv.org, Report cs.IT\/0411003 (2004), http:\/\/arxiv.org\/abs\/cs.IT\/0411003"},{"issue":"8","key":"11_CR11","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"A.D. Wyner","year":"1975","unstructured":"Wyner, A.D.: The wire\u2013tap channel. The Bell System Technical Journal\u00a054(8), 1355\u20131387 (1975)","journal-title":"The Bell System Technical Journal"}],"container-title":["Lecture Notes in Computer Science","Security and Privacy in Ad-Hoc and Sensor Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11964254_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:22:58Z","timestamp":1619508178000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11964254_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540691723","9783540691730"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/11964254_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}