{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T00:42:05Z","timestamp":1725583325382},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/isit.2014.6875011","type":"proceedings-article","created":{"date-parts":[[2014,8,19]],"date-time":"2014-08-19T21:50:30Z","timestamp":1408485030000},"page":"1141-1145","source":"Crossref","is-referenced-by-count":5,"title":["Secret key-private key generation over three terminals: Capacity region"],"prefix":"10.1109","author":[{"given":"Huishuai","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Lifeng","family":"Lai","sequence":"additional","affiliation":[]},{"given":"Yingbin","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2340400"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2012.6404753"},{"journal-title":"Information Theoretic Generation of Multiple Secret Keys","year":"2005","author":"ye","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.838380"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2013.6620655"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.809560"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.809559"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/18.243431"},{"key":"1","article-title":"The secret key-private key capacity region for three terminals","author":"ye","year":"2005","journal-title":"Proc IEEE Int Symp Information Theory (ISIT)"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.809563"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2180527"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.120924"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.902666"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1973.1055037"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/18.825796"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/18.748999"}],"event":{"name":"2014 IEEE International Symposium on Information Theory (ISIT)","start":{"date-parts":[[2014,6,29]]},"location":"Honolulu, HI, USA","end":{"date-parts":[[2014,7,4]]}},"container-title":["2014 IEEE International Symposium on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6867217\/6874773\/06875011.pdf?arnumber=6875011","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T14:39:29Z","timestamp":1602686369000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6875011"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/isit.2014.6875011","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}