{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T06:49:17Z","timestamp":1774680557097,"version":"3.50.1"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/allerton.2014.7028449","type":"proceedings-article","created":{"date-parts":[[2015,2,5]],"date-time":"2015-02-05T19:24:07Z","timestamp":1423164247000},"page":"148-151","source":"Crossref","is-referenced-by-count":21,"title":["Strong converse for a degraded wiretap channel via active hypothesis testing"],"prefix":"10.1109","author":[{"given":"Masahito","family":"Hayashi","sequence":"first","affiliation":[]},{"given":"Himanshu","family":"Tyagi","sequence":"additional","affiliation":[]},{"given":"Shun","family":"Watanabe","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"17","first-page":"369","article-title":"A bound for multiparty secret key agreement and implications for a problem of secure computing","author":"tyagi","year":"2014","journal-title":"Proc EUROCRYPT"},{"key":"18","author":"tyagi","year":"2014","journal-title":"Converses for Secret Key Agreement and Secure Computing"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2014.7028529"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2262496"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2043769"},{"key":"14","first-page":"1327","article-title":"Arimoto channel coding converse and R\ufffdnyi divergence","author":"polyanskiy","year":"2010","journal-title":"Proc Conference on Communication Control and Computing (Allerton"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2288971"},{"key":"12","first-page":"33","article-title":"Strong converse theorems in quantum information theory","volume":"68","author":"nagaoka","year":"2001","journal-title":"ERATO Workshop on Quantum Information Science 2001"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055892"},{"key":"2","first-page":"48","article-title":"Almost independence and secrecy capacity","volume":"32","author":"csisz\ufffdr","year":"1996","journal-title":"Probl Pered Informat"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/18.243431"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"key":"7","author":"kullback","year":"1968","journal-title":"Information Theory and Statistics"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2023726"},{"key":"5","author":"hayashi","year":"2006","journal-title":"Quantum Information An Introduction"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.871040"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055917"},{"key":"8","author":"leung-yan-cheong","year":"1976","journal-title":"Multi-user and wiretap channels including feedback"}],"event":{"name":"2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","location":"Monticello, IL, USA","start":{"date-parts":[[2014,9,30]]},"end":{"date-parts":[[2014,10,3]]}},"container-title":["2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7008053\/7028426\/07028449.pdf?arnumber=7028449","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T05:07:48Z","timestamp":1490332068000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7028449\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/allerton.2014.7028449","relation":{},"subject":[],"published":{"date-parts":[[2014,9]]}}}