{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T15:28:27Z","timestamp":1773761307631,"version":"3.50.1"},"reference-count":32,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2011,1]]},"DOI":"10.1109\/tit.2010.2090197","type":"journal-article","created":{"date-parts":[[2010,12,29]],"date-time":"2010-12-29T22:05:04Z","timestamp":1293660304000},"page":"424-435","source":"Crossref","is-referenced-by-count":167,"title":["Secure Network Coding on a Wiretap Network"],"prefix":"10.1109","volume":"57","author":[{"given":"Ning","family":"Cai","sequence":"first","affiliation":[]},{"given":"Raymond W.","family":"Yeung","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2009.5206009"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1561\/0100000007I"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2008.4594969"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2007.4557098"},{"key":"ref11","article-title":"On the capacity of secure network coding","author":"feldman","year":"2004","journal-title":"42nd Ann Allerton Conf Commun Contr Comput"},{"key":"ref12","author":"ford jr","year":"1962","journal-title":"Flows in Networks"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(78)90275-9"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1093\/ietfec\/e91-a.10.2720"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.881746"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.847712"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1269720"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.807285"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2007.4557282"},{"key":"ref28","author":"yeung","year":"2008","journal-title":"Information Theory and Network Coding"},{"key":"ref4","article-title":"Valuable messages and random outputs of channels in linear network coding","author":"cai","year":"2009","journal-title":"IEEE Int Symp Inf Theory 2009"},{"key":"ref27","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4419-8608-5","author":"yeung","year":"2002","journal-title":"A First Course in Information Theory"},{"key":"ref3","first-page":"313","article-title":"safeguarding cryptographic keys","volume":"48","author":"blakley","year":"1979","journal-title":"Proc Nat Comput Conf"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2007.4557284"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"19","DOI":"10.4310\/CIS.2006.v6.n1.a2","article-title":"network error correction, part i: basic concepts and upper bounds","volume":"6","author":"yeung","year":"2006","journal-title":"Commun Inf Syst"},{"key":"ref5","article-title":"Secure network coding","author":"cai","year":"2002","journal-title":"IEEE Int Symp Inf Theory"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/AUSCTW.2008.4460828"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"37","DOI":"10.4310\/CIS.2006.v6.n1.a3","article-title":"Network error correction, Part II: Lower bounds","volume":"6","author":"cai","year":"2006","journal-title":"Commun Inf Syst"},{"key":"ref2","article-title":"weakly secure network coding","author":"bhattad","year":"2005","journal-title":"Proc First Workshop on Network Coding Theory Appl (NetCod'05)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/18.850663"},{"key":"ref9","author":"cover","year":"2006","journal-title":"Elements of Information Theory"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/NETCOD.2009.5191393"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1984.tb00072.x"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/NETCOD.2009.5191401"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref23","article-title":"Secure network coding with a cost criterion","author":"tan","year":"2006","journal-title":"2nd Workshop on Network Coding Theory and Appl"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/18.133259"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/18\/5673678\/05673688.pdf?arnumber=5673688","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,4]],"date-time":"2023-06-04T17:06:46Z","timestamp":1685898406000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5673688\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1]]},"references-count":32,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tit.2010.2090197","relation":{},"ISSN":["0018-9448","1557-9654"],"issn-type":[{"value":"0018-9448","type":"print"},{"value":"1557-9654","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,1]]}}}