{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T00:22:58Z","timestamp":1725668578915},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/isit.2017.8006988","type":"proceedings-article","created":{"date-parts":[[2017,8,29]],"date-time":"2017-08-29T18:54:37Z","timestamp":1504032877000},"page":"2543-2547","source":"Crossref","is-referenced-by-count":15,"title":["Private Broadcasting: An index coding approach"],"prefix":"10.1109","author":[{"given":"Mohammed","family":"Karmoose","sequence":"first","affiliation":[]},{"given":"Linqi","family":"Song","sequence":"additional","affiliation":[]},{"given":"Martina","family":"Cardone","sequence":"additional","affiliation":[]},{"given":"Christina","family":"Fragouli","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2016.7541531"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/293347.293350"},{"journal-title":"Broadcasting with privacy an index coding approach","year":"2017","author":"karmoose","key":"ref10"},{"journal-title":"The Capacity of Private Information Retrieval","year":"2016","author":"sun","key":"ref6"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"journal-title":"Private information retrieval from coded databases with colluding servers","year":"2016","author":"freij-hollanti","key":"ref5"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/NETCOD.2015.7176784"},{"key":"ref8","first-page":"234","article-title":"All-or-nothing disclosure of secrets","author":"brassard","year":"1987","journal-title":"Advances in Cryptology Proceedings of Crypto '86"},{"journal-title":"The capacity of private information retrieval from coded databases","year":"2016","author":"banawan","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2188777"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2014.6875091"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2103753"}],"event":{"name":"2017 IEEE International Symposium on Information Theory (ISIT)","start":{"date-parts":[[2017,6,25]]},"location":"Aachen, Germany","end":{"date-parts":[[2017,6,30]]}},"container-title":["2017 IEEE International Symposium on Information Theory (ISIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7999336\/8006474\/08006988.pdf?arnumber=8006988","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,9,7]],"date-time":"2017-09-07T04:44:48Z","timestamp":1504759488000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8006988\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/isit.2017.8006988","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}