{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T12:51:30Z","timestamp":1761396690455,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T00:00:00Z","timestamp":1698624000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T00:00:00Z","timestamp":1698624000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100016311","name":"Arm","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100016311","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,30]]},"DOI":"10.1109\/milcom58377.2023.10356259","type":"proceedings-article","created":{"date-parts":[[2023,12,25]],"date-time":"2023-12-25T19:37:01Z","timestamp":1703533021000},"page":"685-690","source":"Crossref","is-referenced-by-count":1,"title":["A Practical Perfect Secrecy Approach for IoBT Systems"],"prefix":"10.1109","author":[{"given":"Mohammad","family":"Moltafet","sequence":"first","affiliation":[{"name":"University of California Santa Cruz,Department of Electrical and Computer Engineering,Santa Cruz,USA"}]},{"given":"Hamid R.","family":"Sadjadpour","sequence":"additional","affiliation":[{"name":"University of California Santa Cruz,Department of Electrical and Computer Engineering,Santa Cruz,USA"}]},{"given":"Zouheir","family":"Rezki","sequence":"additional","affiliation":[{"name":"University of California Santa Cruz,Department of Electrical and Computer Engineering,Santa Cruz,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/T-AIEE.1926.5061224"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32284-6_6"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/BF00191321"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052243"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.1003845"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/509907.509960"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365700"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1038\/s41534-021-00510-2"},{"key":"ref12","first-page":"114","article-title":"A public-key cryptosystem based on algebraic coding theory","volume":"4244","author":"McEliece","year":"1978","journal-title":"Coding Thv"},{"key":"ref13","first-page":"173","article-title":"A variant of the McEliece cryptosystem with increased public key security","volume-title":"Proc. Inter. Workshop on Coding and Crypto","author":"Baldi"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-003-6151-2"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63931-4_5"},{"key":"ref16","first-page":"309","article-title":"Weight two masking of the reed-solomon structure in conjugation with list decoding","volume-title":"Proc. Inter. Symp. on Mathematical Theory of Net. and Sys","author":"Khathuria"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-014-9967-z"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2712636"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2574841"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46447-2_8"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-017-0402-0"},{"volume-title":"Concrete Mathematics","year":"1994","author":"Graham","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511803949"}],"event":{"name":"MILCOM 2023 - 2023 IEEE Military Communications Conference (MILCOM)","start":{"date-parts":[[2023,10,30]]},"location":"Boston, MA, USA","end":{"date-parts":[[2023,11,3]]}},"container-title":["MILCOM 2023 - 2023 IEEE Military Communications Conference (MILCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10356123\/10356124\/10356259.pdf?arnumber=10356259","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T22:45:43Z","timestamp":1705099543000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10356259\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,30]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/milcom58377.2023.10356259","relation":{},"subject":[],"published":{"date-parts":[[2023,10,30]]}}}