{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:56:55Z","timestamp":1725573415704},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/iwsda.2013.6849075","type":"proceedings-article","created":{"date-parts":[[2014,7,29]],"date-time":"2014-07-29T15:48:08Z","timestamp":1406648888000},"page":"110-113","source":"Crossref","is-referenced-by-count":0,"title":["Degraded multiple-access channel with confidential messages"],"prefix":"10.1109","author":[{"family":"Bin Dai","sequence":"first","affiliation":[]},{"family":"Yongtao Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Information Theory Coding Theorems for Discrete Memoryless Systems","year":"1981","author":"csisz-ar","key":"17"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921879"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.915978"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.872968"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.928272"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2012.6283955"},{"journal-title":"Information-Theoretical Security for Several Models of Multiple-Access Channel","year":"0","author":"dai","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1977.1055655"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055892"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.3390\/e14091671"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.929914"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2032814"},{"key":"5","first-page":"258","author":"ahlswede","year":"2006","journal-title":"Transmission Identification and Common Randomness Capacities for Wire-Tap Channels with Secure Feedback from the Decoder Book Chapter in General Theory of Information Transfer and Combinatorics LNCS 4123"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055917"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.911157"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921858"}],"event":{"name":"2013 Sixth International Workshop on Signal Design and its Applications in Communications (IWSDA)","start":{"date-parts":[[2013,10,27]]},"location":"Tokyo, Japan","end":{"date-parts":[[2013,11,1]]}},"container-title":["The Sixth International Workshop on Signal Design and Its Applications in Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6842404\/6849038\/06849075.pdf?arnumber=6849075","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T18:04:50Z","timestamp":1490292290000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6849075\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/iwsda.2013.6849075","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}