{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:29:18Z","timestamp":1761611358196},"reference-count":35,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2014,11,1]],"date-time":"2014-11-01T00:00:00Z","timestamp":1414800000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"Ministero dell\u2019Istruzione, dell\u2019Universit\u00e0 e della Ricerca through the ESCAPADE Project within the Futuro in Ricerca 2010 Funding Program","award":["RBFR105NLC"],"award-info":[{"award-number":["RBFR105NLC"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1109\/tifs.2014.2348915","type":"journal-article","created":{"date-parts":[[2014,8,18]],"date-time":"2014-08-18T19:59:27Z","timestamp":1408391967000},"page":"1765-1779","source":"Crossref","is-referenced-by-count":33,"title":["Secrecy Transmission on Parallel Channels: Theoretical Limits and Performance of Practical Codes"],"prefix":"10.1109","volume":"9","author":[{"given":"Marco","family":"Baldi","sequence":"first","affiliation":[]},{"given":"Franco","family":"Chiaraluce","sequence":"additional","affiliation":[]},{"given":"Nicola","family":"Laurenti","sequence":"additional","affiliation":[]},{"given":"Stefano","family":"Tomasin","sequence":"additional","affiliation":[]},{"given":"Francesco","family":"Renna","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","article-title":"Minimum-weight codewords in the (128,64) BCH code","author":"baumert","year":"1977"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/EW.2009.5357980"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2006.657"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/18.485714"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.920216"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1959.tb03905.x"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2207382"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2008.4797642"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2139208"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2009.5426065"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2134093"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CIG.2010.5592833"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/iccw.2011.5963540"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2187515"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2145371"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2011.011811.102433"},{"key":"ref28","author":"wicker","year":"1995","journal-title":"Error Control Systems for Digital Communication and Storage"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2195491"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.878176"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2007.4298441"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130907"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"995","DOI":"10.1109\/GLOCOM.2001.965567","article-title":"Progressive edgegrowth Tanner graphs","author":"hu","year":"2001","journal-title":"Proc IEEE Global Telecommun Conf (GLOBECOM)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2010.5671796"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CIG.2010.5592770"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2233735"},{"key":"ref2","first-page":"116","article-title":"The secrecy capacity of a class of parallel Gaussian compound wiretap channels","author":"liu","year":"2008","journal-title":"Proc IEEE Int Symp Inf Theory (ISIT)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2162275"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.928990"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511977985"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICTEL.2008.4652697"},{"key":"ref21","first-page":"841","article-title":"Secrecy capacity of independent parallel channels","author":"li","year":"2006","journal-title":"Proc Annu Allerton Conf Commun Control Comput"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.2265141"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511807213"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.838090"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/49.924864"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/6912034\/06879445.pdf?arnumber=6879445","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:52:28Z","timestamp":1642006348000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6879445"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":35,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2014.2348915","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,11]]}}}