{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:55:53Z","timestamp":1743011753216,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1109\/acssc.2015.7421191","type":"proceedings-article","created":{"date-parts":[[2016,2,29]],"date-time":"2016-02-29T21:19:04Z","timestamp":1456780744000},"page":"559-563","source":"Crossref","is-referenced-by-count":3,"title":["Strong secrecy for interference channels from channel resolvability"],"prefix":"10.1109","author":[{"given":"Zhao","family":"Wang","sequence":"first","affiliation":[]},{"given":"Rafael F.","family":"Schaefer","sequence":"additional","affiliation":[]},{"given":"Mikael","family":"Skoglund","sequence":"additional","affiliation":[]},{"given":"H. Vincent","family":"Poor","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Xiao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.871040"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2283722"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/18.256486"},{"key":"ref13","first-page":"9","article-title":"Distance-divergence inequalities","author":"marton","year":"2014","journal-title":"IEEE Information Theory Society Newsletter"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511921889"},{"key":"ref15","article-title":"Information divergence approximation to product distributions","author":"hou","year":"2013","journal-title":"Proc Canad Workshop Inf Theory"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2014.6874903"},{"journal-title":"Information Spectrum Methods in Information Theory","year":"2002","author":"han","key":"ref17"},{"key":"ref18","article-title":"Strong secrecy for interference channels: Achievable rate region and degrees of freedom","author":"wang","year":"2015","journal-title":"IEEE Trans Inform Theory"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921879"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055917"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.915978"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921678"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45539-6_24","article-title":"Information-theoretic key agreement: From weak to strong secrecy for free","author":"maurer","year":"2000","journal-title":"Advances in Cryptology - EUROCRYPT 2000"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2001.955145"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055892"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"ref9","first-page":"40","article-title":"Almost independence and secrecy capacity","volume":"32","author":"csisz\u00e1r","year":"1996","journal-title":"Problems of Information Transmission"}],"event":{"name":"2015 49th Asilomar Conference on Signals, Systems and Computers","start":{"date-parts":[[2015,11,8]]},"location":"Pacific Grove, CA","end":{"date-parts":[[2015,11,11]]}},"container-title":["2015 49th Asilomar Conference on Signals, Systems and Computers"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7405775\/7421038\/07421191.pdf?arnumber=7421191","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,5]],"date-time":"2020-02-05T22:50:48Z","timestamp":1580943048000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7421191\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/acssc.2015.7421191","relation":{},"subject":[],"published":{"date-parts":[[2015,11]]}}}