{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:45:41Z","timestamp":1730274341516,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1109\/isit.2009.5205819","type":"proceedings-article","created":{"date-parts":[[2009,8,24]],"date-time":"2009-08-24T11:09:52Z","timestamp":1251112192000},"page":"2767-2771","source":"Crossref","is-referenced-by-count":2,"title":["The secrecy capacity of the semi-deterministic broadcast channel"],"prefix":"10.1109","author":[{"family":"Wei Kang","sequence":"first","affiliation":[]},{"given":"Nan","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"the secrecy rate region of the broadcast channel","year":"0","author":"bagherikaram","key":"19"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921861"},{"key":"18","article-title":"secrecy capacity of a class of broadcast channels with an eavesdropper","author":"ekrem","year":"2008","journal-title":"Submitted to EURASIP Journal on Wireless Communications and Networking Special Isssue on Wireless Physical Layer Security"},{"key":"15","article-title":"secrecy capacity region of a multi-antenna gaussian broadcast channel with condential messages","author":"liu","year":"2007","journal-title":"Submitted to IEEE Trans Information Theory"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2027500"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2008.4595384"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921879"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2008.4558628"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2008.4797670"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2007.4298265"},{"key":"20","article-title":"the k-receiver broadcast channel with confidential messages","author":"choo","year":"0","journal-title":"IEEE Trans on Information Theory"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2050958"},{"key":"23","article-title":"on the equivocation region of relay channels with orthogonal components","author":"he","year":"2007","journal-title":"Asilomar Conference on Signals Systems and Computers"},{"key":"24","article-title":"the gaussian wiretap channel with a helping interferer","author":"tang","year":"2008","journal-title":"IEEE International Symposium on Information Theory"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1977.1055800"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1977.1055655"},{"key":"27","first-page":"19","article-title":"coding for channel with random parameters","volume":"9","author":"gelfand","year":"1980","journal-title":"Probl Contr and Inform Theory"},{"year":"0","key":"28"},{"key":"29","article-title":"superposition encoding and partial decoding is optimal for a class of z-interference channels","author":"liu","year":"2008","journal-title":"IEEE International Symposium on Information Theory"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055892"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"10","article-title":"relay channels with confidential messages","author":"oohama","year":"0","journal-title":"IEEE Trans on Information Theory"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055917"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1979.1056046"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2007.4313144"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921680"},{"journal-title":"Information Theory Coding Theorems for Discrete Memoryless Systems","year":"1981","author":"csiszar","key":"32"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.2006422"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.915978"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.928272"},{"year":"0","key":"8"}],"event":{"name":"2009 IEEE International Symposium on Information Theory - ISIT","start":{"date-parts":[[2009,6,28]]},"location":"Seoul, South Korea","end":{"date-parts":[[2009,7,3]]}},"container-title":["2009 IEEE International Symposium on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5179947\/5205248\/05205819.pdf?arnumber=5205819","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T01:37:26Z","timestamp":1489801046000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5205819\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/isit.2009.5205819","relation":{},"subject":[],"published":{"date-parts":[[2009,6]]}}}