{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:35:34Z","timestamp":1729672534580,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/isit.2014.6874787","type":"proceedings-article","created":{"date-parts":[[2014,8,19]],"date-time":"2014-08-19T17:50:30Z","timestamp":1408470630000},"page":"21-25","source":"Crossref","is-referenced-by-count":3,"title":["General formula for secrecy capacity of wiretap channel with noncausal state"],"prefix":"10.1109","author":[{"given":"Jun","family":"Muramatsu","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2012.6404748"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2013.6620668"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.855604"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2011.6034202"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2012.6283010"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921860"},{"key":"16","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1561\/0100000036","article-title":"Information theoretic security","volume":"5","author":"liang","year":"2009","journal-title":"Foundation Trends Commun Inf Theory"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.871040"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1989.63486"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/18.256486"},{"key":"12","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-12066-8","author":"han","year":"2003","journal-title":"Information-spectrum methods in information theory"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2309140"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.911157"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2013.6620669"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2010.5513744"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/18.651026"},{"key":"10","first-page":"19","article-title":"Coding for channel with random parameters","volume":"9","author":"gel'fand","year":"1983","journal-title":"Probl Inf Transm (Probl Pered Inform )"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511921889"},{"key":"6","first-page":"40","article-title":"Almost independence and secrecy capacity","volume":"32","author":"csiszar","year":"1996","journal-title":"Problems of Information Transmission"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1982.1056524"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1975.1055356"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(79)90044-8"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055892"}],"event":{"name":"2014 IEEE International Symposium on Information Theory (ISIT)","start":{"date-parts":[[2014,6,29]]},"location":"Honolulu, HI, USA","end":{"date-parts":[[2014,7,4]]}},"container-title":["2014 IEEE International Symposium on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6867217\/6874773\/06874787.pdf?arnumber=6874787","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T11:25:27Z","timestamp":1602674727000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6874787"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/isit.2014.6874787","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}