{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T07:58:30Z","timestamp":1723017510567},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,8]]},"DOI":"10.1109\/cig.2010.5592833","type":"proceedings-article","created":{"date-parts":[[2010,10,1]],"date-time":"2010-10-01T16:05:07Z","timestamp":1285949107000},"source":"Crossref","is-referenced-by-count":51,"title":["Non-systematic codes for physical layer security"],"prefix":"10.1109","author":[{"given":"Marco","family":"Baldi","sequence":"first","affiliation":[]},{"given":"Marco","family":"Bianchi","sequence":"additional","affiliation":[]},{"given":"Franco","family":"Chiaraluce","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"114","article-title":"A public-key cryptosystem based on algebraic coding theory","author":"mceliece","year":"1978","journal-title":"DSN progress report"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2005.1523675"},{"key":"ref12","first-page":"1879","article-title":"Non-systematic LDPC codes via scrambling and splitting","author":"alloum","year":"2005","journal-title":"Proc Allerton Control and Communications Conf"},{"key":"ref13","article-title":"Non-systematic LDPC codes for redundant data","author":"shamir","year":"2006","journal-title":"the Inaugural Workshop Center for Information Theory and Application"},{"key":"ref14","article-title":"High rate non-systematic LDPC codes for nonuniform sources","author":"shamir","year":"2006","journal-title":"International Symposium on Turbo Codes and Related Topics"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11767-006-0248-5"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"995","DOI":"10.1109\/GLOCOM.2001.965567","article-title":"Progressive edge-growth tanner graphs","author":"hu","year":"2001","journal-title":"Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921858"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.901143"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/EMERGING.2009.25"},{"key":"ref5","first-page":"1","article-title":"LDPC codes for physical layer security","author":"klinc","year":"2009","journal-title":"Proc IEEE Global Telecommunications Conference (GLOBECOM 2009)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055917"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5199337"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.929914"}],"event":{"name":"2010 IEEE Information Theory Workshop (ITW 2010)","location":"Dublin, Ireland","start":{"date-parts":[[2010,8,30]]},"end":{"date-parts":[[2010,9,3]]}},"container-title":["2010 IEEE Information Theory Workshop"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5581172\/5592637\/05592833.pdf?arnumber=5592833","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,5]],"date-time":"2019-06-05T01:19:42Z","timestamp":1559697582000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5592833\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/cig.2010.5592833","relation":{},"subject":[],"published":{"date-parts":[[2010,8]]}}}