{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:39:28Z","timestamp":1761647968518,"version":"3.44.0"},"reference-count":14,"publisher":"IEEE","license":[{"start":{"date-parts":[[2012,3,1]],"date-time":"2012-03-01T00:00:00Z","timestamp":1330560000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2012,3,1]],"date-time":"2012-03-01T00:00:00Z","timestamp":1330560000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1109\/infcom.2012.6195757","type":"proceedings-article","created":{"date-parts":[[2012,5,24]],"date-time":"2012-05-24T18:26:40Z","timestamp":1337884000000},"page":"3051-3055","source":"Crossref","is-referenced-by-count":7,"title":["Impact of secrecy on capacity in large-scale wireless networks"],"prefix":"10.1109","author":[{"given":"Jinbei","family":"Zhang","sequence":"first","affiliation":[{"name":"Dept. of Electronic Engineering, Shanghai Jiao Tong University, China"}]},{"family":"Luoyi Fu","sequence":"additional","affiliation":[{"name":"Dept. of Electronic Engineering, Shanghai Jiao Tong University, China"}]},{"given":"Xinbing","family":"Wang","sequence":"additional","affiliation":[{"name":"Dept. of Electronic Engineering, Shanghai Jiao Tong University, China"}]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.890791"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2109042"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1859995.1859997"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/18.825799"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ITA.2011.5743597"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2008.4595044"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2165800"},{"key":"7","article-title":"Security-capacity Tradeoff in Large Wireless Networks using Keyless Secrecy","author":"vasudevan","year":"0","journal-title":"Proc ACM MobiHoc Chicago Illinois USA Sept 2010"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921908"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062115"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.060848"},{"journal-title":"The Throughput Cost of Information-Theoretic Security in Decentralized Wireless Networks","year":"0","author":"zhou","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ITA.2010.5454119"}],"event":{"name":"IEEE INFOCOM 2012 - IEEE Conference on Computer Communications","start":{"date-parts":[[2012,3,25]]},"location":"Orlando, FL, USA","end":{"date-parts":[[2012,3,30]]}},"container-title":["2012 Proceedings IEEE INFOCOM"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6189419\/6195452\/06195757.pdf?arnumber=6195757","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:04:40Z","timestamp":1756235080000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6195757\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/infcom.2012.6195757","relation":{},"subject":[],"published":{"date-parts":[[2012,3]]}}}