{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T02:24:06Z","timestamp":1725416646802},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,2]]},"DOI":"10.1109\/iccnc.2014.6785372","type":"proceedings-article","created":{"date-parts":[[2014,4,17]],"date-time":"2014-04-17T14:04:24Z","timestamp":1397743464000},"page":"424-428","source":"Crossref","is-referenced-by-count":0,"title":["Practical provably secure multi-node communication"],"prefix":"10.1109","author":[{"given":"Omar","family":"Ali","sequence":"first","affiliation":[]},{"given":"Mahmoud F.","family":"Ayoub","sequence":"additional","affiliation":[]},{"given":"Moustafa","family":"Youssef","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Practical Provably Secure Multinode Communication","year":"2013","author":"ali","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/2348688.2348707"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2013.101113.130356"},{"key":"14","article-title":"Achievable secrecy rate regions for the two-way wiretap channel","author":"el gamal","year":"0","journal-title":"IEEE Transactions on Information Theory"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5963462"},{"key":"12","article-title":"Dialog codes for secure wireless communications","author":"arora","year":"2009","journal-title":"Processing in Sensor Networks"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"journal-title":"RSA Laboratories' Frequently Asked Questions about Today's Cryptography","year":"2001","author":"keon","key":"1"},{"key":"10","article-title":"Keys through ARQ: Theory and practice","author":"omar","year":"2011","journal-title":"IEEE Transactions on Information Forensics & Security"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2009.5351483"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2007.4298441"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2007.4557403"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"key":"9","article-title":"ARQ security in rfid networks","author":"elsabagh","year":"2011","journal-title":"IEEE ICC '11 Workshop on Physical Layer Security"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2010.5707052"}],"event":{"name":"2014 International Conference on Computing, Networking and Communications (ICNC)","start":{"date-parts":[[2014,2,3]]},"location":"Honolulu, HI","end":{"date-parts":[[2014,2,6]]}},"container-title":["2014 International Conference on Computing, Networking and Communications (ICNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6778476\/6785290\/06785372.pdf?arnumber=6785372","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T12:31:37Z","timestamp":1490272297000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6785372\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/iccnc.2014.6785372","relation":{},"subject":[],"published":{"date-parts":[[2014,2]]}}}