{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:11:20Z","timestamp":1729674680848,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/iwcit.2014.6842505","type":"proceedings-article","created":{"date-parts":[[2014,7,28]],"date-time":"2014-07-28T21:23:33Z","timestamp":1406582613000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["An achievable scheme for the one-receiver, two-eavesdropper broadcast channel"],"prefix":"10.1109","author":[{"given":"Sadaf","family":"Salehkalaibar","sequence":"first","affiliation":[]},{"given":"Mohammad Reza","family":"Aref","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1561\/0100000036","article-title":"Information theoretic security","volume":"5","author":"liang","year":"2008","journal-title":"Foundations Trends Commun Inf Theory"},{"key":"11","article-title":"On the secrecy of three-receiver broadcast channel with degraded message sets","author":"salehkalaibar","year":"2013","journal-title":"IET Security"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139030687"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921879"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055892"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2264675"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2238655"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/824235"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2008.4797644"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2027500"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2011.6034283"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2184668"}],"event":{"name":"2014 Iran Workshop on Communication and Information Theory (IWCIT)","start":{"date-parts":[[2014,5,7]]},"location":"Tehran, Iran","end":{"date-parts":[[2014,5,8]]}},"container-title":["2014 Iran Workshop on Communication and Information Theory (IWCIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6830039\/6842477\/06842505.pdf?arnumber=6842505","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T17:27:02Z","timestamp":1498152422000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6842505\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/iwcit.2014.6842505","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}