{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T21:02:00Z","timestamp":1774990920593,"version":"3.50.1"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2016,7,1]],"date-time":"2016-07-01T00:00:00Z","timestamp":1467331200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2016,7,1]],"date-time":"2016-07-01T00:00:00Z","timestamp":1467331200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1109\/isit.2016.7541530","type":"proceedings-article","created":{"date-parts":[[2016,8,15]],"date-time":"2016-08-15T18:52:57Z","timestamp":1471287177000},"page":"1406-1410","source":"Crossref","is-referenced-by-count":7,"title":["The rate region of secure exact-repair regenerating codes for 5 nodes"],"prefix":"10.1109","author":[{"given":"Fangwei","family":"Ye","sequence":"first","affiliation":[{"name":"Institute of Network Coding &amp; Department of Information Engineering, The Chinese University of Hong Kong, Shatin, N.T., Hong Kong"}]},{"given":"Kenneth W.","family":"Shum","sequence":"additional","affiliation":[{"name":"Institute of Network Coding &amp; Department of Information Engineering, The Chinese University of Hong Kong, Shatin, N.T., Hong Kong"}]},{"given":"Raymond W.","family":"Yeung","sequence":"additional","affiliation":[{"name":"Institute of Network Coding &amp; Department of Information Engineering, The Chinese University of Hong Kong, Shatin, N.T., Hong Kong"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2162191"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2011.6133754"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2159049"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883931"},{"key":"ref14","article-title":"Distrivuted Storage Systems with Secure and Exact Repair-New Results","author":"tandon","year":"2014","journal-title":"Proc Inf Theory Appl Workshop"},{"key":"ref15","article-title":"To-wards Optimal Secure Distributed Storage Systems with Exact Repair","author":"tandon","year":"2013","journal-title":"arXiv 1310 0054"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2014.7028487"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2016.7541530"},{"key":"ref4","article-title":"A Note on the Rate Region of Exact-Repair Regenerating Codes","author":"tian","year":"2015","journal-title":"arXiv 1503 00011"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.140516"},{"key":"ref6","article-title":"Outer bounds for exact repair codes","author":"duursma","year":"2014","journal-title":"arXiv 1406 4852"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2014.6875270"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2015.2408595"},{"key":"ref7","article-title":"The Storage-Repair-Bandwidth Tradeoff of Exact Repair Linear Regenerating Codes for the Case d = k = n ? 1","author":"prakash","year":"2015","journal-title":"Proc IEEE Int Symp Inf Theory"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2009.5394538"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2054295"},{"key":"ref9","article-title":"Shortened regenerating codes","author":"duursma","year":"2015","journal-title":"arXiv 1505 00178"}],"event":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","location":"Barcelona, Spain","start":{"date-parts":[[2016,7,10]]},"end":{"date-parts":[[2016,7,15]]}},"container-title":["2016 IEEE International Symposium on Information Theory (ISIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7532279\/7541040\/07541530.pdf?arnumber=7541530","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T19:52:24Z","timestamp":1774986744000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7541530\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/isit.2016.7541530","relation":{},"subject":[],"published":{"date-parts":[[2016,7]]}}}