{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T18:10:50Z","timestamp":1761847850127,"version":"build-2065373602"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.23919\/isita.2018.8664253","type":"proceedings-article","created":{"date-parts":[[2019,3,11]],"date-time":"2019-03-11T19:49:11Z","timestamp":1552333751000},"page":"663-667","source":"Crossref","is-referenced-by-count":2,"title":["On the Secrecy Capacity of 2-user Gaussian Interference Channel with Independent Secret Keys"],"prefix":"10.23919","author":[{"given":"Aditya","family":"Sinha","sequence":"first","affiliation":[{"name":"Indian Institute of Technology, Kharagpur, India"}]},{"given":"Parthajit","family":"Mohapatra","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology, Tirupati, India"}]},{"given":"Jemin","family":"Lee","sequence":"additional","affiliation":[{"name":"Institute of Science and Technology, Daegu, Korea"}]},{"given":"Tony Q.S.","family":"Quek","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/CISS.2009.5054738"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/ICASSP.2014.6853864"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/ISIT.2015.7282800"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/TIT.2008.2006447"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/TIT.2013.2283722"},{"year":"2006","author":"cover","journal-title":"Elements of Information Theory 2nd Edition (Wiley Series in Telecommunications and Signal Processing)","key":"ref15"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1017\/CBO9781139030687"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/TIT.2008.921858"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/18.568694"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/ISITA.2008.4895417"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/CIG.2010.5592665"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/TIT.1978.1055892"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/TIT.2009.2032814"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/TIT.2008.921879"}],"event":{"name":"2018 International Symposium on Information Theory and Its Applications (ISITA)","start":{"date-parts":[[2018,10,28]]},"location":"Singapore","end":{"date-parts":[[2018,10,31]]}},"container-title":["2018 International Symposium on Information Theory and Its Applications (ISITA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8660385\/8664205\/08664253.pdf?arnumber=8664253","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T17:59:32Z","timestamp":1761847172000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8664253\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":16,"URL":"https:\/\/doi.org\/10.23919\/isita.2018.8664253","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}