{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,22]],"date-time":"2025-03-22T04:19:40Z","timestamp":1742617180575,"version":"3.40.2"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540579366"},{"type":"electronic","value":"9783540483922"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1994]]},"DOI":"10.1007\/3-540-57936-2_37","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T13:41:26Z","timestamp":1330263686000},"page":"153-172","source":"Crossref","is-referenced-by-count":2,"title":["Performance of BCH codes with DES encryption in a digital mobile channel"],"prefix":"10.1007","author":[{"given":"Guy","family":"Ferland","sequence":"first","affiliation":[]},{"given":"Jean-Yves","family":"Chouinard","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,6]]},"reference":[{"key":"11_CR1","volume-title":"Cipher Systems: The Protection of Communications","author":"H. Beker","year":"1982","unstructured":"H. Beker, F. Piper, \u201cCipher Systems: The Protection of Communications\u201d, Northwood Books, London, 1982."},{"key":"11_CR2","volume-title":"Theory and Practice of Error Control Codes","author":"R.E. Blahut","year":"1984","unstructured":"R.E. Blahut, \u201cTheory and Practice of Error Control Codes\u201d, Addison-Wesley, Reading, Massachusetts, 1984."},{"key":"11_CR3","volume-title":"Principles and Practice of Information Theory","author":"R.E. Blahut","year":"1987","unstructured":"R.E. Blahut, \u201cPrinciples and Practice of Information Theory\u201d, Addison-Wesley, Reading, Massachusetts, 1987."},{"issue":"No.3","key":"11_CR4","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1109\/25.16542","volume":"37","author":"J.-Y. Chouinard","year":"1988","unstructured":"J.-Y. Chouinard, M. Lecours, G.Y. Delisle, \u201cEstimation of Gilbert's and Fritchman's Models Parameters Using the Gradient Method for Digital Mobile Radio Channels\u201d, IEEE Transactions on Vehicular Technology, Vol. 37, No. 3, August 1988, pp. 158\u2013166.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"11_CR5","volume-title":"Cryptography and Data Security","author":"D.E.R. Denning","year":"1983","unstructured":"D.E.R. Denning, \u201cCryptography and Data Security\u201d, Addison-Wesley, Reading, Massachusetts, 1983."},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"G. Ferland, J.-Y. Chouinard, \u201cError Rate Performance Analysis of Stream and Block Ciphers in a Digital Mobile Communication Channel\u201d, Third Annual Conference on Vehicular Navigation and Information Systems (VNIS 92, Oslo, Norway), September 1992, pp. 426\u2013433.","DOI":"10.1109\/VNIS.1992.640229"},{"key":"11_CR7","volume-title":"M.A.Sc. thesis","author":"G. Ferland","year":"1993","unstructured":"G. Ferland, \u201cError Rate Performance Analysis of Stream and Block Ciphers in a Digital Mobile Communication Channel\u201d, M.A.Sc. thesis, University of Ottawa, Ottawa, Canada, July 1993."},{"issue":"No.2","key":"11_CR8","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1109\/TIT.1967.1053975","volume":"IT-13","author":"B.D. Fritchman","year":"1967","unstructured":"B.D. Fritchman, \u201cA Binary Channel Characterization Using Partitioned Markov Chains\u201d, IEEE Transactions on Information Theory, Vol. IT-13, No. 2, April 1967, pp. 221\u2013227.","journal-title":"IEEE Transactions on Information Theory"},{"key":"11_CR9","unstructured":"R.G. Gallager, \u201cInformation Theory and Reliable Communication\u201d, John Wiley and Sons, 1968."},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"E.N. Gilbert, \u201cCapacity of a Burst-Noise Channel\u201d, Bell System Technical Journal, September 1960, pp. 1253\u20131265.","DOI":"10.1002\/j.1538-7305.1960.tb03959.x"},{"issue":"No.7","key":"11_CR11","doi-asserted-by":"crossref","first-page":"724","DOI":"10.1109\/PROC.1978.11013","volume":"66","author":"L.N. Kanal","year":"1978","unstructured":"L.N. Kanal, A.R.K. Sastry, \u201cModels for Channels with Memory and Their Applications to Error Control\u201d, Proceedings of the IEEE, Vol. 66, No. 7, July 1978, pp. 724\u2013744.","journal-title":"Proceedings of the IEEE"},{"issue":"No.4","key":"11_CR12","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1109\/25.31125","volume":"37","author":"M. Lecours","year":"1988","unstructured":"M. Lecours, J.-Y. Chouinard, G.Y.Delisle, J. Roy. \u201cStatistical Modelling of the Received Signal Envelope in a Mobile Radio Channel\u201d, IEEE Transactions on Vehicular Technology, Vol 37, No. 4, November 1988, pp. 204\u2013212.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"11_CR13","unstructured":"W.C. Lee \u201cMobile Communications Engineering\u201d, McGraw-Hill, 1982."},{"key":"11_CR14","volume-title":"Error Control Coding: Fundamentals and Applications","author":"S. Lin","year":"1983","unstructured":"S. Lin, D.J. Costello, \u201cError Control Coding: Fundamentals and Applications\u201d, Prentice-Hall, New Jersey, 1983."},{"key":"11_CR15","unstructured":"C.P. Pfleeger, \u201cSecurity in Computing\u201d, Prentice-Hall, 1989."},{"issue":"No.4","key":"11_CR16","doi-asserted-by":"crossref","first-page":"769","DOI":"10.1109\/25.108388","volume":"40","author":"A. Semmar","year":"1991","unstructured":"A. Semmar, M. Lecours, J.-Y. Chouinard, J. Ahern, \u201cCharacterization of Error Sequences in UHF Digital Mobile Radio Channels\u201d, IEEE Transactions on Vehicular Technology, Vol. 40, No. 4, November 1991, pp. 769\u2013775.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"11_CR17","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C.E. Shannon","year":"1949","unstructured":"C.E. Shannon, \u201cCommunication Theory of Secrecy Systems\u201d, Bell System Technical Journal, Vol. 28, October 1949, pp. 656\u2013715.","journal-title":"Bell System Technical Journal"},{"key":"11_CR18","unstructured":"D.J. Torrieri, \u201cPrinciples of Secure Communication Systems\u201d, first edition, Artech House."}],"container-title":["Lecture Notes in Computer Science","Information Theory and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-57936-2_37.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,21]],"date-time":"2025-03-21T22:16:42Z","timestamp":1742595402000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-57936-2_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1994]]},"ISBN":["9783540579366","9783540483922"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/3-540-57936-2_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1994]]}}}