{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T11:41:08Z","timestamp":1725709268236},"reference-count":8,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/itw.2016.7606824","type":"proceedings-article","created":{"date-parts":[[2016,10,27]],"date-time":"2016-10-27T16:28:46Z","timestamp":1477585726000},"page":"201-205","source":"Crossref","is-referenced-by-count":11,"title":["Keyless authentication in the presence of a simultaneously transmitting adversary"],"prefix":"10.1109","author":[{"given":"Eric","family":"Graves","sequence":"first","affiliation":[]},{"given":"Paul","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Predrag","family":"Spasojevic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.070194"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.916273"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2320634"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.2009842"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2013.6620732"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511921889"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"key":"ref1","first-page":"411","article-title":"Authentication theory\/coding theory","author":"simmons","year":"1984","journal-title":"Advances in Cryptology-crypto'1984"}],"event":{"name":"2016 IEEE Information Theory Workshop (ITW)","start":{"date-parts":[[2016,9,11]]},"location":"Cambridge, United Kingdom","end":{"date-parts":[[2016,9,14]]}},"container-title":["2016 IEEE Information Theory Workshop (ITW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7592513\/7606780\/07606824.pdf?arnumber=7606824","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,11,23]],"date-time":"2016-11-23T02:12:56Z","timestamp":1479867176000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7606824\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/itw.2016.7606824","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}