{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:01:20Z","timestamp":1725793280200},"reference-count":5,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,12]]},"DOI":"10.1109\/isita.2008.4895420","type":"proceedings-article","created":{"date-parts":[[2009,4,28]],"date-time":"2009-04-28T16:15:26Z","timestamp":1240935326000},"page":"1-6","source":"Crossref","is-referenced-by-count":20,"title":["An information-theoretic cryptanalysis of network coding - is protecting the code enough?"],"prefix":"10.1109","author":[{"given":"Luisa","family":"Lima","sequence":"first","affiliation":[]},{"given":"Joao P.","family":"Vilela","sequence":"additional","affiliation":[]},{"given":"Joao","family":"Barros","sequence":"additional","affiliation":[]},{"given":"Muriel","family":"Medard","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","article-title":"Practical network coding","author":"chou","year":"2003","journal-title":"Allerton Conference on Communication Control and Computing"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.336"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2007.4557282"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2003.818197"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.881746"}],"event":{"name":"2008 International Symposium on Information Theory and Its Applications (ISITA)","start":{"date-parts":[[2008,12,7]]},"location":"Auckland, New Zealand","end":{"date-parts":[[2008,12,10]]}},"container-title":["2008 International Symposium on Information Theory and Its Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4816040\/4895364\/04895420.pdf?arnumber=4895420","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T15:45:44Z","timestamp":1489765544000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4895420\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,12]]},"references-count":5,"URL":"https:\/\/doi.org\/10.1109\/isita.2008.4895420","relation":{},"subject":[],"published":{"date-parts":[[2008,12]]}}}