{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T00:42:51Z","timestamp":1725583371132},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/glocomw.2016.7848839","type":"proceedings-article","created":{"date-parts":[[2017,2,9]],"date-time":"2017-02-09T21:41:58Z","timestamp":1486676518000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["Arbitrarily Varying Wiretap Channels with Type Constrained States"],"prefix":"10.1109","author":[{"given":"Ziv","family":"Goldfeld","sequence":"first","affiliation":[]},{"given":"Paul","family":"Cuff","sequence":"additional","affiliation":[]},{"given":"Haim H.","family":"Permuter","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"A channel under simultaneous jamming and eavesdropping attack - correlated random coding capacities under strong secrecy criteria","author":"wiese","year":"2015","journal-title":"Submitted for publication to IEEE Trans Inf Theory"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/GLOCOMW.2016.7848839"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/18.2598"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/TIT.2009.2023727"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/TIT.2016.2565483"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1155\/2009\/142374"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/18.2598"},{"year":"2009","author":"molavianjazi","article-title":"Secure communication over arbitrarily varying wiretap channels","key":"ref6"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1134\/S0032946013010079"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/ISIT.2011.6034206"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1007\/978-3-642-36899-8_5"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1007\/BF00533053"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"ref9","article-title":"A cryptographic treatment of the wiretap channel","author":"bellare","year":"2012","journal-title":"Proc Advances in Cryptology (CRYPTO)"}],"event":{"name":"2016 IEEE Globecom Workshops (GC Wkshps)","start":{"date-parts":[[2016,12,4]]},"location":"Washington, DC, USA","end":{"date-parts":[[2016,12,8]]}},"container-title":["2016 IEEE Globecom Workshops (GC Wkshps)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7840534\/7848793\/07848839.pdf?arnumber=7848839","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T22:34:51Z","timestamp":1488407691000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7848839\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/glocomw.2016.7848839","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}