{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T22:55:39Z","timestamp":1768344939546,"version":"3.49.0"},"reference-count":13,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2018,7,1]],"date-time":"2018-07-01T00:00:00Z","timestamp":1530403200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61601514"],"award-info":[{"award-number":["61601514"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61501516"],"award-info":[{"award-number":["61501516"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61521003"],"award-info":[{"award-number":["61521003"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Lett."],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/lcomm.2018.2831703","type":"journal-article","created":{"date-parts":[[2018,4,30]],"date-time":"2018-04-30T18:29:11Z","timestamp":1525112951000},"page":"1466-1469","source":"Crossref","is-referenced-by-count":25,"title":["Cooperative Group Secret Key Generation Based on Secure Network Coding"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3718-2675","authenticated-orcid":false,"given":"Shuaifang","family":"Xiao","sequence":"first","affiliation":[]},{"given":"Yunfei","family":"Guo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7084-3826","authenticated-orcid":false,"given":"Kaizhi","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Liang","family":"Jin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2014.2310747"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2015.7417477"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2553643"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1049\/el.2017.2346"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2521718"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.120924"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.838380"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2706657"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2313566"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2007.4557610"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1109\/TIFS.2010.2043187","article-title":"Information-theoretically secret key generation for fading wireless channels","volume":"5","author":"ye","year":"2010","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICICSE.2012.64"}],"container-title":["IEEE Communications Letters"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4234\/8408583\/08352789.pdf?arnumber=8352789","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:13:18Z","timestamp":1642003998000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8352789\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":13,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/lcomm.2018.2831703","relation":{},"ISSN":["1089-7798","1558-2558","2373-7891"],"issn-type":[{"value":"1089-7798","type":"print"},{"value":"1558-2558","type":"electronic"},{"value":"2373-7891","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7]]}}}