{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T08:15:24Z","timestamp":1761293724898,"version":"3.37.3"},"reference-count":31,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2018,6,1]],"date-time":"2018-06-01T00:00:00Z","timestamp":1527811200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["61771259"],"award-info":[{"award-number":["61771259"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Hong Kong Scholars Program","award":["XJ2016028"],"award-info":[{"award-number":["XJ2016028"]}]},{"name":"University Grants Committee of the Hong Kong","award":["AoE\/E-02\/08"],"award-info":[{"award-number":["AoE\/E-02\/08"]}]},{"name":"Vice-Chancellor\u2019s One-off Discretionary Fund of CUHK","award":["VCF2014030","VCF2015007"],"award-info":[{"award-number":["VCF2014030","VCF2015007"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/tit.2018.2824244","type":"journal-article","created":{"date-parts":[[2018,4,6]],"date-time":"2018-04-06T19:55:21Z","timestamp":1523044521000},"page":"4513-4529","source":"Crossref","is-referenced-by-count":15,"title":["Alphabet Size Reduction for Secure Network Coding: A Graph Theoretic Approach"],"prefix":"10.1109","volume":"64","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0928-421X","authenticated-orcid":false,"given":"Xuan","family":"Guang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7386-4027","authenticated-orcid":false,"given":"Raymond W.","family":"Yeung","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","first-page":"1277","article-title":"Algorithm for solution of a problem of maximum flow in a network with power estimation","volume":"11","author":"dinic","year":"1970","journal-title":"Soviet Math Doklady"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1002\/1520-6750(199106)38:3<413::AID-NAV3220380310>3.0.CO;2-J"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.847712"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2090216"},{"key":"ref12","first-page":"1833","article-title":"On network matroids and linear network codes","author":"sun","year":"2008","journal-title":"Proc IEEE Int Symp Inf Theory"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2015.2473863"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1561\/0100000007I","article-title":"Network coding theory","volume":"2","author":"yeung","year":"2005","journal-title":"Found Trends Commun Inf Theory"},{"journal-title":"Information Theory and Network Coding","year":"2008","author":"yeung","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1561\/1300000003"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1561\/1300000013"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511754623"},{"key":"ref19","first-page":"323","article-title":"Secure network coding","author":"cai","year":"2002","journal-title":"Proc IEEE Int Symp Inf Theory"},{"journal-title":"Network Flows Theory Algorithms and Applications","year":"1993","author":"ahuja","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1984.tb00072.x"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1956.1056816"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/18.761254"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84628-970-5"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1109\/PROC.1978.10848","article-title":"on increasing the down-link capacity of a regenerative satellite repeater in point-to-point communications","volume":"66","author":"celebiler","year":"1978","journal-title":"Proceedings of the IEEE"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.807285"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/18.850663"},{"key":"ref2","first-page":"313","article-title":"Safeguarding cryptographic keys","volume":"48","author":"blakley","year":"1979","journal-title":"Proc Nat Comput Conf"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2003.818197"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2090197"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2090212"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2173631"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-015-0155-6"},{"key":"ref23","first-page":"63","article-title":"On the capacity of secure network coding","author":"feldman","year":"2004","journal-title":"Proc 42nd Ann Allerton Conf Commun Control Comput"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.4153\/CJM-1956-045-5"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2014.2385053"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/18\/8361085\/08332948.pdf?arnumber=8332948","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:22:25Z","timestamp":1642004545000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8332948\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":31,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tit.2018.2824244","relation":{},"ISSN":["0018-9448","1557-9654"],"issn-type":[{"type":"print","value":"0018-9448"},{"type":"electronic","value":"1557-9654"}],"subject":[],"published":{"date-parts":[[2018,6]]}}}