{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T18:27:10Z","timestamp":1772303230051,"version":"3.50.1"},"reference-count":20,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Commun. Netw."],"published-print":{"date-parts":[[2009,12]]},"DOI":"10.1109\/jcn.2009.6388407","type":"journal-article","created":{"date-parts":[[2013,8,30]],"date-time":"2013-08-30T20:25:47Z","timestamp":1377894347000},"page":"538-543","source":"Crossref","is-referenced-by-count":14,"title":["Build-in wiretap channel I with feedback and LDPC codes"],"prefix":"10.23919","volume":"11","author":[{"given":"Hong","family":"Wen","sequence":"first","affiliation":[{"name":"UESTC, China"}]},{"given":"Guang","family":"Gong","sequence":"additional","affiliation":[{"name":"Dept. of Electrical Computer Engineering, University of Waterloo, Canada"}]},{"given":"Pin-Han","family":"Ho","sequence":"additional","affiliation":[{"name":"Dept. of Electrical Computer Engineering, University of Waterloo, Canada"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.901143"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921908"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.833352"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.1993.397441"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4347.001.0001","article-title":"Low Density Parity Check Codes","author":"gallager","year":"1963"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/18.748992"},{"key":"ref17","article-title":"Theoretically and computationally secure key agreement in cryptography","author":"wolf","year":"1999"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"1121","DOI":"10.1109\/18.243431","article-title":"Common randomness in information theory and cryptography, part I: Secret sharing","volume":"39","author":"csiszar","year":"1993","journal-title":"IEEE Trans Inf Theory"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1093\/ietfec\/e89-a.7.2036"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.820010"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055892"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2008.080077"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.4304\/jcm.2.3.24-32"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921680"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2007.4298265"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.929914"},{"key":"ref20","first-page":"301","article-title":"Variable rate LDPC codes for wireless applications","author":"marco","year":"2006","journal-title":"Proc SoftCOM"}],"container-title":["Journal of Communications and Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5449605\/6388403\/06388407.pdf?arnumber=6388407","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T19:01:52Z","timestamp":1738782112000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6388407\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12]]},"references-count":20,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/jcn.2009.6388407","relation":{},"ISSN":["1229-2370","1976-5541"],"issn-type":[{"value":"1229-2370","type":"print"},{"value":"1976-5541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,12]]}}}