{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:13:38Z","timestamp":1730283218351,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/milcom.2018.8599830","type":"proceedings-article","created":{"date-parts":[[2019,1,3]],"date-time":"2019-01-03T23:10:39Z","timestamp":1546557039000},"page":"977-982","source":"Crossref","is-referenced-by-count":1,"title":["Achieving Perfect Secrecy with One Bit Keys"],"prefix":"10.1109","author":[{"given":"Mohsen Karimzadeh","family":"Kiskani","sequence":"first","affiliation":[]},{"given":"Hamid R.","family":"Sadjadpour","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Weakly secure network coding","author":"kapil","year":"2005","journal-title":"NetCod Apr"},{"key":"ref11","first-page":"445","article-title":"On a weakly secure regenerating code construction for minimum storage regime","author":"swanand","year":"2014","journal-title":"Communication Control and Computing (Allerton) 2014 52nd Annual Allerton Conference"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5199337"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2017.7876159"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2628030"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2756623"},{"key":"ref16","article-title":"Secure and private cloud storage systems with random linear fountain codes","author":"karimzadeh kiskani","year":"2017","journal-title":"Cloud and Big Data Computing (CBDCOM) 2017 International Conference on IEEE"},{"key":"ref17","article-title":"On the role of MMSE estimation in approaching the information-theoretic limits of linear gaussian channels: Shannon meets wiener","author":"g david","year":"2004","journal-title":"arXiv preprint cs\/0409053"},{"key":"ref4","first-page":"1948","article-title":"Security in distributed storage systems by communicating a logarithmic number of bits","author":"theodoros","year":"2010","journal-title":"Information Theory Proceedings (ISIT) 2010 IEEE International Symposium"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"4539","DOI":"10.1109\/TIT.2010.2054295","article-title":"Network coding for distributed storage systems","volume":"56","author":"alexandros","year":"2010","journal-title":"IEEE Transactions on Information Theory"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1109\/TIT.2013.2288784","article-title":"Optimal locally repairable and secure codes for distributed storage systems","volume":"60","author":"ankit singh","year":"2014","journal-title":"IEEE Transactions on Information Theory"},{"key":"ref5","first-page":"2543","article-title":"On secure distributed data storage under repair dynamics","author":"sameer","year":"2010","journal-title":"Information Theory Proceedings (ISIT) 2010 IEEE International Symposium"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"1491","DOI":"10.1109\/LCOMM.2016.2574355","article-title":"Secure repairable fountain codes","volume":"20","author":"siddhartha","year":"2016","journal-title":"IEEE Communications Letters"},{"key":"ref7","first-page":"v","article-title":"Distributed fountain codes for networked storage","volume":"5","author":"alexandros g","year":"2006","journal-title":"Acoustics Speech and Signal Processing 2006 ICASSP 2006 Proceedings 2006 IEEE International Conference"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1109\/ICC.2018.8422283","article-title":"Low complexity secure code (LCSC) design for big data in cloud storage systems","author":"karimzadeh kiskani","year":"2018","journal-title":"Communications (ICC) 2018 International Conference on IEEE"},{"key":"ref1","first-page":"656","article-title":"Communication theory of secrecy systems","author":"claude","year":"1949","journal-title":"Bell Labs Technical Journal"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2002.1023595"}],"event":{"name":"MILCOM 2018 - IEEE Military Communications Conference","start":{"date-parts":[[2018,10,29]]},"location":"Los Angeles, CA","end":{"date-parts":[[2018,10,31]]}},"container-title":["MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8580348\/8599678\/08599830.pdf?arnumber=8599830","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,25]],"date-time":"2022-01-25T23:20:28Z","timestamp":1643152828000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8599830\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/milcom.2018.8599830","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}