{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T04:08:07Z","timestamp":1725422887579},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/iwcmc.2013.6583549","type":"proceedings-article","created":{"date-parts":[[2013,8,29]],"date-time":"2013-08-29T15:31:30Z","timestamp":1377790290000},"page":"143-148","source":"Crossref","is-referenced-by-count":1,"title":["A tight estimation of the security gap over the fast fading wiretap channel"],"prefix":"10.1109","author":[{"given":"Marco","family":"Baldi","sequence":"first","affiliation":[]},{"given":"Marco","family":"Bianchi","sequence":"additional","affiliation":[]},{"given":"Nicola","family":"Maturo","sequence":"additional","affiliation":[]},{"given":"Franco","family":"Chiaraluce","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.920216"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.889699"},{"journal-title":"Principles of Mobile Communication","year":"2011","author":"stu?ber","key":"15"},{"key":"16","article-title":"Security gap assessment for the fast fading wiretap channel","author":"baldi","year":"2013","journal-title":"Proceedings of the Twelth International Conference on Telecommunications (ICT 2013)"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2161953"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2012.030712.100173"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/2463183.2463194"},{"key":"12","doi-asserted-by":"crossref","DOI":"10.1049\/iet-ifs.2012.0127","article-title":"Security and complexity of the McEliece cryptosystem based on QC-LDPC codes","author":"baldi","year":"2013","journal-title":"IET Information Security"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2187515"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2009.5351456"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2006.657"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.928990"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/WCL.2012.122612.120787"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/CIG.2010.5592833"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/iccw.2011.5963540"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2195491"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921678"}],"event":{"name":"2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC 2013)","start":{"date-parts":[[2013,7,1]]},"location":"Sardinia, Italy","end":{"date-parts":[[2013,7,5]]}},"container-title":["2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6578011\/6583517\/06583549.pdf?arnumber=6583549","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T16:58:26Z","timestamp":1498064306000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6583549\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2013.6583549","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}