{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T02:09:11Z","timestamp":1730254151250,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icppw.2003.1240396","type":"proceedings-article","created":{"date-parts":[[2004,3,1]],"date-time":"2004-03-01T21:26:50Z","timestamp":1078176410000},"page":"409-416","source":"Crossref","is-referenced-by-count":0,"title":["Perfect secrecy in wireless networks"],"prefix":"10.1109","author":[{"given":"P.G.","family":"Bradford","sequence":"first","affiliation":[]},{"given":"O.V.","family":"Gavrylyako","sequence":"additional","affiliation":[]},{"given":"R.K.","family":"Smith","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"1996","author":"schneier","journal-title":"Applied Cryptography","key":"ref10"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/359168.359176"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"year":"2003","author":"stallings","journal-title":"Cryptography and Network Security Principles and Practice","key":"ref13"},{"year":"2002","author":"stinson","journal-title":"Cryptography Theory and Practice","key":"ref14"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1007\/978-1-4612-0659-0"},{"year":"1980","author":"hamming","journal-title":"Coding and Information Theory","key":"ref4"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/ICDCSW.2003.1203641"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/18.256484"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/TIT.1977.1055709"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1007\/s00145-001-0009-4"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1007\/s00145-001-0010-y"},{"key":"ref2","first-page":"313","article-title":"Safeguarding Cryptographic Keys","volume":"48","author":"blakley","year":"1979","journal-title":"Proc AFIPS 1979 NCC"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1002\/0471722154"},{"year":"2002","author":"pollard","journal-title":"A user's guide to measure theoretic probability","key":"ref9"}],"event":{"acronym":"ICPPW-03","name":"2003 International Conference on Parallel Processing Workshops","location":"Kaohsiung, Taiwan"},"container-title":["2003 International Conference on Parallel Processing Workshops, 2003. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8781\/27812\/01240396.pdf?arnumber=1240396","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T13:09:35Z","timestamp":1489410575000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1240396\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/icppw.2003.1240396","relation":{},"subject":[]}}