{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T03:08:42Z","timestamp":1730344122929,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.23919\/isita.2018.8664257","type":"proceedings-article","created":{"date-parts":[[2019,3,11]],"date-time":"2019-03-11T19:49:11Z","timestamp":1552333751000},"page":"673-677","source":"Crossref","is-referenced-by-count":0,"title":["The Symmetric Two-Hop Channel with an Untrusted Relay"],"prefix":"10.23919","author":[{"given":"Shahab","family":"Ghasemi-Goojani","sequence":"first","affiliation":[]},{"given":"Panagiotis","family":"Papadimitratos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"358","DOI":"10.1145\/1161089.1161129","article-title":"Hot topic: physical-layer network coding","author":"zhang","year":"2006","journal-title":"Proceedings of the 12th Annual International Conference on Mobile Computing and Networking"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/TVT.2012.2207438"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/TWC.2012.120412.101358"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/TIT.2015.2412114"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/TIFS.2015.2405903"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/TIT.2017.2757503"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/TIT.2011.2165816"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1017\/CBO9781139045520"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"2293","DOI":"10.1109\/TIT.2004.834787","article-title":"Achieving 1\/2 log(1 +SNR) on the AWGN channel with lattice encoding and decoding","volume":"50","author":"erez","year":"2004","journal-title":"IEEE Trans Inf Theory"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"3401","DOI":"10.1109\/TIT.2005.855591","article-title":"Lattices which are good for (almost) everything","volume":"51","author":"erez","year":"2005","journal-title":"IEEE Trans Inf Theory"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/TIT.2008.921680"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/TIT.2007.915978"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/TIT.2014.2298132"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/TIT.2011.2119650"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/TIT.2010.2050958"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/TIT.2008.928272"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1155\/2009\/305146"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/ALLERTON.2008.4797696"}],"event":{"name":"2018 International Symposium on Information Theory and Its Applications (ISITA)","start":{"date-parts":[[2018,10,28]]},"location":"Singapore","end":{"date-parts":[[2018,10,31]]}},"container-title":["2018 International Symposium on Information Theory and Its Applications (ISITA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8660385\/8664205\/08664257.pdf?arnumber=8664257","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T02:48:04Z","timestamp":1643251684000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8664257\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":20,"URL":"https:\/\/doi.org\/10.23919\/isita.2018.8664257","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}