{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T23:47:44Z","timestamp":1725407264253},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/giis.2018.8635694","type":"proceedings-article","created":{"date-parts":[[2019,2,7]],"date-time":"2019-02-07T23:55:53Z","timestamp":1549583753000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["Delay Performance of a Two-User Broadcast Channel with Security Constraints"],"prefix":"10.1109","author":[{"given":"Antonia","family":"Arvanitaki","sequence":"first","affiliation":[]},{"given":"Nikolaos","family":"Pappas","sequence":"additional","affiliation":[]},{"given":"Parthajit","family":"Mohapatra","sequence":"additional","affiliation":[]},{"given":"Niklas","family":"Carlsson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.928272"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130920"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2011.061511.102257"},{"key":"ref13","first-page":"21","article-title":"Security-capacity tradeoff in large wireless networks using keyless secrecy","author":"vasudevan","year":"2010","journal-title":"ACM Mobihoc"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/18.21216"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2013.6691293"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2018.2834943"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2818076"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2018.2808195"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2015.2465903"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1979.1056046"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2090215"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2011.6034121"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/322017.322019"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921861"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2390234"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2006.261613"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055892"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057121"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2408319"}],"event":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","start":{"date-parts":[[2018,10,23]]},"location":"Thessaloniki, Greece","end":{"date-parts":[[2018,10,25]]}},"container-title":["2018 Global Information Infrastructure and Networking Symposium (GIIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8632667\/8635591\/08635694.pdf?arnumber=8635694","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T22:50:51Z","timestamp":1643237451000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8635694\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/giis.2018.8635694","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}