{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T14:27:00Z","timestamp":1726410420230},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642279003"},{"type":"electronic","value":"9783642279010"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-27901-0_11","type":"book-chapter","created":{"date-parts":[[2012,1,17]],"date-time":"2012-01-17T02:01:25Z","timestamp":1326765685000},"page":"132-147","source":"Crossref","is-referenced-by-count":0,"title":["Secret Key Establishment over Noisy Channels"],"prefix":"10.1007","author":[{"given":"Hadi","family":"Ahmadi","sequence":"first","affiliation":[]},{"given":"Reihaneh","family":"Safavi-Naini","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"publisher","first-page":"1121","DOI":"10.1109\/18.243431","volume":"39","author":"R. Ahlswede","year":"1993","unstructured":"Ahlswede, R., Csisz\u00e1r, I.: Common randomness in information theory and cryptography. Part I: secret sharing. IEEE Transaction Information Theory\u00a039, 1121\u20131132 (1993)","journal-title":"IEEE Transaction Information Theory"},{"key":"11_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/11889342_13","volume-title":"General Theory of Information Transfer and Combinatorics","author":"R. Ahlswede","year":"2006","unstructured":"Ahlswede, R., Cai, N.: Transmission, identification and common randomness capacities for wire-tape channels with secure feedback from the decoder. In: Ahlswede, R., B\u00e4umer, L., Cai, N., Aydinian, H., Blinovsky, V., Deppe, C., Mashurian, H. (eds.) General Theory of Information Transfer and Combinatorics. LNCS, vol.\u00a04123, pp. 258\u2013275. Springer, Heidelberg (2006)"},{"key":"11_CR3","unstructured":"Ahmadi, H., Safavi-Naini, R.: Secret key establishment over a pair of independent broadcast channels. In: International Symposium Information Theory and its Application, pp. 185\u2013190 (2010) Full version on the arXiv preprint server, arXiv:1001.3908"},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1007\/978-3-642-20465-4_16","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2011","author":"H. Ahmadi","year":"2011","unstructured":"Ahmadi, H., Safavi-Naini, R.: Secret keys from channel noise. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol.\u00a06632, pp. 266\u2013283. Springer, Heidelberg (2011); Full version on the Cryptology ePrint Archive: Report 2011\/063"},{"key":"11_CR5","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1109\/TIT.1978.1055892","volume":"24","author":"I. Csisz\u00e1r","year":"1978","unstructured":"Csisz\u00e1r, I., K\u00f6rner, J.: Broadcast channels with confidential messages. IEEE Transaction Information Theory\u00a024, 339\u2013348 (1978)","journal-title":"IEEE Transaction Information Theory"},{"key":"11_CR6","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transaction Information Theory\u00a022, 644\u2013654 (1976)","journal-title":"IEEE Transaction Information Theory"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Khisti, A., Diggavi, S., Wornell, G.: Secret key generation with correlated sources and noisy channels. In: IEEE International Symposium Information Theory, pp. 1005\u20131009 (2008)","DOI":"10.1109\/ISIT.2008.4595138"},{"key":"11_CR8","unstructured":"K\u00f6rner, J., Marton, K.: Comparison of two noisy channels. Transactions of the Hungarian Colloquium on Information Theory, 411\u2013423 (1977)"},{"key":"11_CR9","doi-asserted-by":"publisher","first-page":"733","DOI":"10.1109\/18.256484","volume":"39","author":"U. Maurer","year":"1993","unstructured":"Maurer, U.: Secret key agreement by public discussion from common information. IEEE Transaction Information Theory\u00a039, 733\u2013742 (1993)","journal-title":"IEEE Transaction Information Theory"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Prabhakaran, V., Eswaran, K., Ramchandran, K.: Secrecy via sources and channels - a secret key - secret message rate trade-off region. In: IEEE International Symposium Information Theory, pp. 1010\u20131014 (2008)","DOI":"10.1109\/ISIT.2008.4595139"},{"key":"11_CR11","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C.E. Shannon","year":"1948","unstructured":"Shannon, C.E.: Communication theory of secrecy systems. Bell System Technical Journal\u00a028, 656\u2013715 (1948)","journal-title":"Bell System Technical Journal"},{"key":"11_CR12","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"A.D. Wyner","year":"1975","unstructured":"Wyner, A.D.: The wire-tap channel. Bell System Technical Journal\u00a054, 1355\u20131367 (1975)","journal-title":"Bell System Technical Journal"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27901-0_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,25]],"date-time":"2019-04-25T00:11:48Z","timestamp":1556151108000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27901-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642279003","9783642279010"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27901-0_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}