{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T06:18:58Z","timestamp":1774678738761,"version":"3.50.1"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/isit.2014.6874864","type":"proceedings-article","created":{"date-parts":[[2014,8,19]],"date-time":"2014-08-19T17:50:30Z","timestamp":1408470630000},"page":"406-410","source":"Crossref","is-referenced-by-count":9,"title":["Secure coordination with a two-sided helper"],"prefix":"10.1109","author":[{"given":"Sanket","family":"Satpathy","sequence":"first","affiliation":[]},{"given":"Paul","family":"Cuff","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","author":"gamal","year":"2012","journal-title":"Network Information Theory"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2046238"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1975.1055346"},{"key":"23","author":"cover","year":"2006","journal-title":"Elements of Information Theory"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2054651"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2013.6691298"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2279330"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2007.4557285"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2006.312762"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2012.6284661"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ITA.2013.6502999"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1982.1056586"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2236973"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/EEEI.2008.4736647"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2008.4578644"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2010.5706980"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysconle.2007.03.010"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2013.6620620"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5683471"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2013.6620617"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2013.6620618"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2010.5707078"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"}],"event":{"name":"2014 IEEE International Symposium on Information Theory (ISIT)","location":"Honolulu, HI, USA","start":{"date-parts":[[2014,6,29]]},"end":{"date-parts":[[2014,7,4]]}},"container-title":["2014 IEEE International Symposium on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6867217\/6874773\/06874864.pdf?arnumber=6874864","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T10:39:44Z","timestamp":1602671984000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6874864"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/isit.2014.6874864","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}