{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T19:50:36Z","timestamp":1725393036430},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/glocomw.2013.6825168","type":"proceedings-article","created":{"date-parts":[[2014,6,17]],"date-time":"2014-06-17T01:53:24Z","timestamp":1402970004000},"page":"1270-1274","source":"Crossref","is-referenced-by-count":0,"title":["Coset codes in a multi-hop network"],"prefix":"10.1109","author":[{"given":"Willie K.","family":"Harrison","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4347.001.0001","author":"gallager","year":"1963","journal-title":"Low-Density Parity-Check Codes"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/CIG.2010.5592770"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2148715"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921908"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1002\/0471739219"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1972.1054727"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2145371"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2007.4313097"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511791338"},{"key":"3","doi-asserted-by":"crossref","DOI":"10.1109\/MSP.2013.2265141","article-title":"Coding for secrecy","author":"harrison","year":"2013","journal-title":"IEEE Signal Processing Magazine [Online ]"},{"key":"20","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1007\/3-540-60693-9_13","article-title":"Good codes based on very sparse matrices","author":"mackay","year":"1995","journal-title":"Cryptography and Coding 5th IMA Conf Ser Lecture Notes in Computer Science"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2011.5751298"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2014.012314.00178"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055892"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2010.5707054"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.901143"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511977985"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2012.6404751"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2009.5394876"}],"event":{"name":"2013 IEEE Globecom Workshops (GC Wkshps)","start":{"date-parts":[[2013,12,9]]},"location":"Atlanta, GA","end":{"date-parts":[[2013,12,13]]}},"container-title":["2013 IEEE Globecom Workshops (GC Wkshps)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6820092\/6824917\/06825168.pdf?arnumber=6825168","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,11]],"date-time":"2019-08-11T15:48:22Z","timestamp":1565538502000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6825168\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/glocomw.2013.6825168","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}