{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T11:08:29Z","timestamp":1744888109339,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,10]]},"DOI":"10.1109\/itw.2011.6089569","type":"proceedings-article","created":{"date-parts":[[2011,12,6]],"date-time":"2011-12-06T15:58:48Z","timestamp":1323187128000},"page":"60-64","source":"Crossref","is-referenced-by-count":18,"title":["Capacity results for compound wiretap channels"],"prefix":"10.1109","author":[{"given":"Igor","family":"Bjelakovic","sequence":"first","affiliation":[]},{"given":"Holger","family":"Boche","sequence":"additional","affiliation":[]},{"given":"Jochen","family":"Sommerfeld","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"40","article-title":"Almost independence and secrecy capacity","volume":"32","author":"csiszar","year":"1996","journal-title":"Problems of Information Transmission"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"journal-title":"Information Theory Coding Theorems for Discrete Memoryless Systems","year":"1981","author":"csiszar","key":"ref10"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11122-004-0002-2"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2010.082010.090170"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1007\/3-540-45539-6_24","article-title":"Information-theoretic key agreement: From weak to strong secrecy for free","volume":"1807","author":"maurer","year":"2000","journal-title":"Advances in Cryptology-EUROCRYPT 2000 Lecture Notes in Computer Science"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/18.243431"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1134\/S0032946013010079"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.839515"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2008.4797642"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177706106"},{"key":"ref1","article-title":"Compound wiretap channels","author":"liang","year":"2008","journal-title":"EURASIP Journal on Wireless Communications and Networking"}],"event":{"name":"2011 IEEE Information Theory Workshop (ITW)","start":{"date-parts":[[2011,10,16]]},"location":"Paraty, Brazil","end":{"date-parts":[[2011,10,20]]}},"container-title":["2011 IEEE Information Theory Workshop"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6081149\/6089351\/06089569.pdf?arnumber=6089569","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T06:53:04Z","timestamp":1497941584000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6089569\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/itw.2011.6089569","relation":{},"subject":[],"published":{"date-parts":[[2011,10]]}}}