{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T15:42:40Z","timestamp":1774021360830,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540850922","type":"print"},{"value":"9783540850939","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-85093-9_5","type":"book-chapter","created":{"date-parts":[[2008,8,12]],"date-time":"2008-08-12T10:24:37Z","timestamp":1218536677000},"page":"40-53","source":"Crossref","is-referenced-by-count":21,"title":["Strong Secrecy for Wireless Channels (Invited Talk)"],"prefix":"10.1007","author":[{"given":"Jo\u00e3o","family":"Barros","sequence":"first","affiliation":[]},{"given":"Matthieu","family":"Bloch","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Barros, J., Rodrigues, M.R.D.: Secrecy capacity of wireless channels. In: Proceedings of the IEEE International Symposium on Information Theory, Seattle, WA (2006)","DOI":"10.1109\/ISIT.2006.261613"},{"issue":"6","key":"5_CR2","doi-asserted-by":"publisher","first-page":"2515","DOI":"10.1109\/TIT.2008.921908","volume":"54","author":"M. Bloch","year":"2008","unstructured":"Bloch, M., Barros, J., Rodrigues, M.R.D., McLaughlin, S.W.: Wireless information-theoretic security. IEEE Transactions on Information Theory\u00a054(6), 2515\u20132534 (2008)","journal-title":"IEEE Transactions on Information Theory"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Bloch, M., Thangaraj, A., McLaughlin, S.W., Merolla, J.-M.: LDPC-based Gaussian key reconciliation. In: Proc. of the IEEE International Workshop on Information Theory, Punta del Este, Uruguay (March 2006)","DOI":"10.1109\/ITW.2006.1633793"},{"issue":"3","key":"5_CR4","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1109\/TIT.1978.1055892","volume":"24","author":"I. Csisz\u00e1r","year":"1978","unstructured":"Csisz\u00e1r, I., Korner, J.: Broadcast channels with confidential messages. IEEE Transactions on Information Theory\u00a024(3), 339\u2013348 (1978)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"6","key":"5_CR5","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory\u00a022(6), 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Gopala, P.K., Lai, L., El-Gamal, H.: On the secrecy capacity of fading channels. In: Proceedings of IEEE International Symposium on Information Theory, Nice, France, eprint:cs.IT\/0610103 (2007)","DOI":"10.1109\/ISIT.2007.4557403"},{"issue":"12","key":"5_CR7","doi-asserted-by":"publisher","first-page":"3235","DOI":"10.1109\/TIT.2003.820010","volume":"49","author":"A. Hero","year":"2003","unstructured":"Hero, A.: Secure space-time communication. IEEE Transactions on Information\u00a049(12), 3235\u20133249 (2003)","journal-title":"IEEE Transactions on Information"},{"issue":"4","key":"5_CR8","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1109\/TIT.1978.1055917","volume":"24","author":"S.K. Leung-Yan-Cheong","year":"1978","unstructured":"Leung-Yan-Cheong, S.K., Hellman, M.E.: The gaussian wiretap channel. IEEE Transactions on Information Theory\u00a024(4), 451\u2013456 (1978)","journal-title":"IEEE Transactions on Information Theory"},{"key":"5_CR9","doi-asserted-by":"publisher","first-page":"2470","DOI":"10.1109\/TIT.2008.921678","volume":"54","author":"Y. Liang","year":"2008","unstructured":"Liang, Y., Poor, H.V., Shamai, S.: Secure communication over fading channels. IEEE Transactions on Information Theory\u00a054, 2470\u20132492 (2008)","journal-title":"IEEE Transactions on Information Theory"},{"key":"5_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/3-540-45539-6_24","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"U. Maurer","year":"2000","unstructured":"Maurer, U., Wolf, S.: Information-theoretic key agreement: From weak to strong secrecy for free. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, p. 351. Springer, Heidelberg (2000)"},{"issue":"3","key":"5_CR11","doi-asserted-by":"publisher","first-page":"733","DOI":"10.1109\/18.256484","volume":"39","author":"U.M. Maurer","year":"1993","unstructured":"Maurer, U.M.: Secret key agreement by public discussion from common information. IEEE Transactions on Information Theory\u00a039(3), 733\u2013742 (1993)","journal-title":"IEEE Transactions on Information Theory"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Negi, R., Goel, S.: Secret communication using artificial noise. In: Proceedings of the IEEE Vehicular Technology Conference, Dallas, TX (September 2005)","DOI":"10.1109\/VETECF.2005.1558439"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Nitinawarat, S.: Secret key generation for correlated gaussian sources. In: Proceedings of the Forty-Fifth Annual Allerton Conference, Monticello, IL (September 2007)","DOI":"10.1109\/ISIT.2008.4595077"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Parada, P., Blahut, R.: Secrecy capacity of SIMO and slow fading channels. In: Proceedings of the IEEE International Symposium on Information Theory, Adelaide, Australia (September 2005)","DOI":"10.1109\/ISIT.2005.1523727"},{"key":"5_CR15","unstructured":"Pinsker, M.S.: Information and Information Stability of Random Variables and Processes. Holden Day (1964)"},{"issue":"7","key":"5_CR16","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"C.E. Shannon","year":"1948","unstructured":"Shannon, C.E., et al.: A mathematical theory of communications. Bell System Technical Journal\u00a027(7), 379\u2013423 (1948)","journal-title":"Bell System Technical Journal"},{"issue":"4","key":"5_CR17","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1109\/TIT.1973.1055037","volume":"19","author":"D. Slepian","year":"1973","unstructured":"Slepian, D., Wolf, J.K.: Noiseless Coding of Correlated Information Sources. IEEE Transactions on Information Theory\u00a019(4), 471\u2013480 (1973)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"8","key":"5_CR18","doi-asserted-by":"publisher","first-page":"2933","DOI":"10.1109\/TIT.2007.901143","volume":"53","author":"A. Thangaraj","year":"2007","unstructured":"Thangaraj, A., Dihidar, S., Calderbank, A.R., McLaughlin, S.W., Merolla, J.-M.: Applications of LDPC codes to the wiretap channels. IEEE Transactions on Information Theory\u00a053(8), 2933\u20132945 (2007)","journal-title":"IEEE Transactions on Information Theory"},{"key":"5_CR19","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"A.D. Wyner","year":"1975","unstructured":"Wyner, A.D.: The wire-tap channel. Bell System Technical Journal\u00a054, 1355\u20131387 (1975)","journal-title":"Bell System Technical Journal"}],"container-title":["Lecture Notes in Computer Science","Information Theoretic Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85093-9_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:21:50Z","timestamp":1606184510000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85093-9_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540850922","9783540850939"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85093-9_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[]}}