{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:37:12Z","timestamp":1725889032482},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319600796"},{"type":"electronic","value":"9783319600802"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-60080-2_11","type":"book-chapter","created":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T14:40:06Z","timestamp":1496328006000},"page":"155-170","source":"Crossref","is-referenced-by-count":0,"title":["Physical Layer Security over Wiretap Channels with Random Parameters"],"prefix":"10.1007","author":[{"given":"Ziv","family":"Goldfeld","sequence":"first","affiliation":[]},{"given":"Paul","family":"Cuff","sequence":"additional","affiliation":[]},{"given":"Haim H.","family":"Permuter","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,2]]},"reference":[{"issue":"7346","key":"11_CR1","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1038\/nature10012","volume":"473","author":"MW Johnson","year":"2011","unstructured":"Johnson, M.W., et al.: Quantum annealing with manufactured spins. Nature 473(7346), 194\u2013198 (2011)","journal-title":"Nature"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Jones, N.: Google and NASA snap up quantum computer D-Wave Two (2013). http:\/\/www.scientificamerican.com\/article.cfm?id=google-nasa-snap-up-quantum-computer-dwave-two","DOI":"10.1038\/nature.2013.12999"},{"issue":"2","key":"11_CR3","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1137\/S0036144598347011","volume":"41","author":"PW Shor","year":"1999","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303\u2013332 (1999)","journal-title":"SIAM Rev."},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Bernstein, D.J.: Introduction to post-quantum cryptography. In: Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.) Post-quantum Cryptography, pp. 1\u201314. Springer, Heidelberg (2009)","DOI":"10.1007\/978-3-540-88702-7_1"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Perlner, R.A., Cooper, D.A.: Quantum resistant public key cryptography: a survey. In: Proceedings of Symposium Identity and Trust on the Internet (IDtrust), Gaithersburg, Maryland, pp. 85\u201393. ACM, April 2009","DOI":"10.1145\/1527017.1527028"},{"key":"11_CR6","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511977985","volume-title":"Physical-Layer Security: From Information Theory to Security Engineering","author":"M Bloch","year":"2011","unstructured":"Bloch, M., Barros, J.: Physical-Layer Security: From Information Theory to Security Engineering. Cambridge University Press, Cambridge (2011)"},{"issue":"8","key":"11_CR7","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"AD Wyner","year":"1975","unstructured":"Wyner, A.D.: The wire-tap channel. Bell Syst. Technol. 54(8), 1355\u20131387 (1975)","journal-title":"Bell Syst. Technol."},{"key":"11_CR8","unstructured":"Gelfand, S.I., Pinsker, M.S.: Coding for channel with random parameters. Probl. Pered. Inform. (Probl. Control Inf. Theor.) 9(1), 19\u201331 (1980)"},{"issue":"1","key":"11_CR9","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1109\/TIT.2007.911157","volume":"54","author":"Y Chen","year":"2008","unstructured":"Chen, Y., Han Vinck, A.J.: Wiretap channel with side information. IEEE Trans. Inf. Theor. 54(1), 395\u2013402 (2008)","journal-title":"IEEE Trans. Inf. Theor."},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Liu, W., Chen, B.: Wiretap channel with two-sided state information. In: Proceedings of 41st Asilomar Conference Signals, System and Computer, Pacific Grove, CA, US, pp. 893\u2013897 (2007)","DOI":"10.1109\/ACSSC.2007.4487347"},{"issue":"5","key":"11_CR11","doi-asserted-by":"crossref","first-page":"2838","DOI":"10.1109\/TIT.2011.2181329","volume":"58","author":"Y-K Chia","year":"2012","unstructured":"Chia, Y.-K., El Gamal, A.: Wiretap channel with causal state information. IEEE Trans. Inf. Theor. 58(5), 2838\u20132849 (2012)","journal-title":"IEEE Trans. Inf. Theor."},{"issue":"4","key":"11_CR12","doi-asserted-by":"crossref","first-page":"1836","DOI":"10.1109\/TIT.2016.2529657","volume":"62","author":"E Song","year":"2016","unstructured":"Song, E., Cuff, P., Poor, V.: The likelihood encoder for lossy compression. IEEE Trans. Inf. Theor. 62(4), 1836\u20131849 (2016)","journal-title":"IEEE Trans. Inf. Theor."},{"key":"11_CR13","unstructured":"Bellare, M., Tessaro, S., Vardy, A.: A cryptographic treatment of the wiretap channel. In: Proceedings of Advance Cryptology, (CRYPTO 2012), Santa Barbara, CA, USA (2012)"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Goldfeld, Z., Cuff, P., Permuter, H.H.: Wiretap channel with random states non-causally available at the encoder. IEEE Trans. Inf. Theor. (2016, submitted)","DOI":"10.1109\/ICSEE.2016.7806196"},{"issue":"12","key":"11_CR15","doi-asserted-by":"crossref","first-page":"7216","DOI":"10.1109\/TIT.2016.2619701","volume":"62","author":"Z Goldfeld","year":"2016","unstructured":"Goldfeld, Z., Cuff, P., Permuter, H.H.: Arbitrarily varying wiretap channels with type constrained states. IEEE Trans. Inf. Theor. 62(12), 7216\u20137244 (2016)","journal-title":"IEEE Trans. Inf. Theor."},{"issue":"2","key":"11_CR16","doi-asserted-by":"crossref","first-page":"652","DOI":"10.1109\/TIT.2011.2173629","volume":"58","author":"A Khisti","year":"2012","unstructured":"Khisti, A., Diggavi, S.N., Wornell, G.W.: Secret-key generation using correlated sources and channels. IEEE Trans. Inf. Theor. 58(2), 652\u2013670 (2012)","journal-title":"IEEE Trans. Inf. Theor."},{"issue":"4","key":"11_CR17","first-page":"4","volume":"61","author":"G Kramer","year":"2011","unstructured":"Kramer, G.: Teaching IT: an identity for the Gelfand-Pinsker converse. IEEE Inf. Theor. Soc. Newslett. 61(4), 4\u20136 (2011)","journal-title":"IEEE Inf. Theor. Soc. Newslett."}],"container-title":["Lecture Notes in Computer Science","Cyber Security Cryptography and Machine Learning"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-60080-2_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T11:24:04Z","timestamp":1569410644000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-60080-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319600796","9783319600802"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-60080-2_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}