{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:04:39Z","timestamp":1730279079387,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1109\/itw.2018.8613524","type":"proceedings-article","created":{"date-parts":[[2019,1,18]],"date-time":"2019-01-18T00:39:34Z","timestamp":1547771974000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["Secure Computation-and-Forward Communication with Linear Codes"],"prefix":"10.1109","author":[{"given":"Masahito","family":"Hayashi","sequence":"first","affiliation":[]},{"given":"Tadashi","family":"Wadayama","sequence":"additional","affiliation":[]},{"given":"Angeles","family":"Vazquez-Castro","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2278971"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2017.8007067"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2018.8437898"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2672670"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2017.8277934"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(79)90044-8"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48658-5_15"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2110950"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.2017.7943976"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"ref4","article-title":"Capacity of Two-Way Relay Channel","volume":"37","author":"zhang","year":"2010","journal-title":"Access Networks AccessNets 2009 Lecture Notes of the Inst for Comp Sciences Social Informatics and Telecom Eng"},{"key":"ref3","first-page":"5718","article-title":"Construction A and D lattices: Construction, goodness, and decoding algorithms","volume":"63","author":"huang","year":"2017","journal-title":"IEEE Trans Inform Theory"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2012.120412.101358"},{"key":"ref5","article-title":"Secure Transmission Using an Untrusted Relay with Scaled Compute-and-Forward","author":"ren","year":"2015","journal-title":"Proc of IEEE Inf Theory Workshop 2015"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2015.2412114"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2216952"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2006.261638"},{"key":"ref1","article-title":"Secure Computation-and-Forward with Linear Codes","author":"hayashi","year":"0","journal-title":"arXiv 1804 10729"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ITWF.2015.7360788"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2280915"}],"event":{"name":"2018 IEEE Information Theory Workshop (ITW)","start":{"date-parts":[[2018,11,25]]},"location":"Guangzhou","end":{"date-parts":[[2018,11,29]]}},"container-title":["2018 IEEE Information Theory Workshop (ITW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8598908\/8613300\/08613524.pdf?arnumber=8613524","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T23:46:05Z","timestamp":1643240765000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8613524\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/itw.2018.8613524","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}