{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T06:45:39Z","timestamp":1750747539376},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/isit.2014.6875056","type":"proceedings-article","created":{"date-parts":[[2014,8,19]],"date-time":"2014-08-19T21:50:30Z","timestamp":1408485030000},"page":"1366-1370","source":"Crossref","is-referenced-by-count":40,"title":["Weakly secure data exchange with Generalized Reed Solomon codes"],"prefix":"10.1109","author":[{"given":"Muxi","family":"Yan","sequence":"first","affiliation":[]},{"given":"Alex","family":"Sprintson","sequence":"additional","affiliation":[]},{"given":"Igor","family":"Zelenko","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2004","author":"ho","journal-title":"Networking From a Network Coding Perspective","key":"13"},{"year":"0","author":"halbawi","journal-title":"Distributed Reed-Solomon Codes for Simple Multiple Access Networks","key":"11"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1109\/ISIT.2014.6875141"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1109\/ISIT.2010.5513313"},{"key":"2","article-title":"On coding for cooperative data exchange","author":"rouayheb","year":"2009","journal-title":"Proceedings of IEEE Information Theory Workshop (ITW)"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1109\/NetCod.2013.6570836"},{"year":"2012","author":"hoang","journal-title":"On Index Coding with Side Information","key":"10"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1109\/ISNETCOD.2011.5979066"},{"year":"0","author":"courtade","journal-title":"Coded Cooperative Data Exchange in Multihop Networks","key":"6"},{"key":"5","article-title":"An optimal divide-and-conquer solution to the linear data exchange problem","author":"milosavljevic","year":"2011","journal-title":"Proceedings of 2011 IEEE International Symposium on Information Theory (ISIT)"},{"key":"4","article-title":"Deterministic algorithm for coded cooperative data exchange","author":"sprintson","year":"2010","journal-title":"Proceedings of 7th International ICST Conference on Heterogeneous Networking for Quality Reliability Security and Robustness (QShine)"},{"key":"9","article-title":"Weakly secure network coding","author":"bhattad","year":"2005","journal-title":"Proceedings of Workshop on Network Coding Theory and Applications (NetCod '05)"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1109\/ITA.2011.5743607"}],"event":{"name":"2014 IEEE International Symposium on Information Theory (ISIT)","start":{"date-parts":[[2014,6,29]]},"location":"Honolulu, HI, USA","end":{"date-parts":[[2014,7,4]]}},"container-title":["2014 IEEE International Symposium on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6867217\/6874773\/06875056.pdf?arnumber=6875056","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T15:22:26Z","timestamp":1602688946000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6875056"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/isit.2014.6875056","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}