{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T10:28:33Z","timestamp":1725704913382},"reference-count":13,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1109\/icc40277.2020.9149183","type":"proceedings-article","created":{"date-parts":[[2020,7,27]],"date-time":"2020-07-27T22:26:45Z","timestamp":1595888805000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Storage and Computation: A Tradeoff in Secure Distributed Computing"],"prefix":"10.1109","author":[{"given":"Jiajun","family":"Chen","sequence":"first","affiliation":[]},{"given":"Chi Wan","family":"Sung","sequence":"additional","affiliation":[]},{"given":"Terence H.","family":"Chan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.01.025"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2500193"},{"key":"ref12","article-title":"MDS codes on erasure-erasure wire-tap channel","author":"arunkumar","year":"2009","journal-title":"Available arXiv 0902 3286v1"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2162191"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2018.8437669"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2018.2877391"},{"key":"ref6","article-title":"Optimal load allocation for coded distributed computation in heterogeneous clusters","author":"kim","year":"2019","journal-title":"arXiv preprint arXiv 1904 01870"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2904055"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2017.8007060"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2846601"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPSW.2018.00137"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2736066"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2756959"}],"event":{"name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","start":{"date-parts":[[2020,6,7]]},"location":"Dublin, Ireland","end":{"date-parts":[[2020,6,11]]}},"container-title":["ICC 2020 - 2020 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9141367\/9148588\/09149183.pdf?arnumber=9149183","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:25:24Z","timestamp":1656375924000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9149183\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icc40277.2020.9149183","relation":{},"subject":[],"published":{"date-parts":[[2020,6]]}}}