Secure Multiterminal Source Coding With Side Information at the Eavesdropper

The problem of secure multiterminal source coding with side information at the eavesdropper is investigated. This scenario consists of a main encoder (referred to as Alice) that wishes to compress a single source but simultaneously satisfying the desired requirements on the distortion level at a leg...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:IEEE transactions on information theory Ročník 59; číslo 6; s. 3668 - 3692
Hlavní autori: Villard, J., Piantanida, P.
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: New York, NY IEEE 01.06.2013
Institute of Electrical and Electronics Engineers
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Predmet:
ISSN:0018-9448, 1557-9654
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract The problem of secure multiterminal source coding with side information at the eavesdropper is investigated. This scenario consists of a main encoder (referred to as Alice) that wishes to compress a single source but simultaneously satisfying the desired requirements on the distortion level at a legitimate receiver (referred to as Bob) and the equivocation rate-average uncertainty-at an eavesdropper (referred to as Eve). It is further assumed the presence of a (public) rate-limited link between Alice and Bob. In this setting, Eve perfectly observes the information bits sent by Alice to Bob and has also access to a correlated source which can be used as side information. A second encoder (referred to as Charlie) helps Bob in estimating Alice's source by sending a compressed version of its own correlated observation via a (private) rate-limited link, which is only observed by Bob. For instance, the problem at hands can be seen as the unification between the Berger-Tung and the secure source coding setups. Inner and outer bounds on the so-called rate-distortion-equivocation region are derived. The inner region turns to be tight for two cases: 1) uncoded side information at Bob and 2) lossless reconstruction of both sources at Bob-secure distributed lossless compression. Application examples to secure lossy source coding of Gaussian and binary sources in the presence of Gaussian and binary/ternary (respectively) side informations are also considered. Optimal coding schemes are characterized for some cases of interest where the statistical differences between the side information at the decoders and the presence of a nonzero distortion at Bob can be fully exploited to guarantee secrecy.
AbstractList The problem of secure multiterminal source coding with side information at the eavesdropper is investigated. This scenario consists of a main encoder (referred to as Alice) that wishes to compress a single source but simultaneously satisfying the desired requirements on the distortion level at a legitimate receiver (referred to as Bob) and the equivocation rate-average uncertainty-at an eavesdropper (referred to as Eve). It is further assumed the presence of a (public) rate-limited link between Alice and Bob. In this setting, Eve perfectly observes the information bits sent by Alice to Bob and has also access to a correlated source which can be used as side information. A second encoder (referred to as Charlie) helps Bob in estimating Alice's source by sending a compressed version of its own correlated observation via a (private) rate-limited link, which is only observed by Bob. For instance, the problem at hands can be seen as the unification between the Berger-Tung and the secure source coding setups. Inner and outer bounds on the so-called rate-distortion-equivocation region are derived. The inner region turns to be tight for two cases: 1) uncoded side information at Bob and 2) lossless reconstruction of both sources at Bob-secure distributed lossless compression. Application examples to secure lossy source coding of Gaussian and binary sources in the presence of Gaussian and binary/ternary (respectively) side informations are also considered. Optimal coding schemes are characterized for some cases of interest where the statistical differences between the side information at the decoders and the presence of a nonzero distortion at Bob can be fully exploited to guarantee secrecy.
The problem of secure multiterminal source coding with side information at the eavesdropper is investigated. This scenario consists of a main encoder (referred to as Alice) that wishes to compress a single source but simultaneously satisfying the desired requirements on the distortion level at a legitimate receiver (referred to as Bob) and the equivocation rate -- average uncertainty -- at an eavesdropper (referred to as Eve). It is further assumed the presence of a (public) rate-limited link between Alice and Bob. In this setting, Eve perfectly observes the information bits sent by Alice to Bob and has also access to a correlated source which can be used as side information. A second encoder (referred to as Charlie) helps Bob in estimating Alice's source by sending a compressed version of its own correlated observation via a (private) rate-limited link, which is only observed by Bob. For instance, the problem at hands can be seen as the unification between the Berger-Tung and the secure source coding setups. Inner and outer bounds on the so-called rate-distortion-equivocation region are derived. The inner region turns to be tight for two cases: 1) uncoded side information at Bob and 2) lossless reconstruction of both sources at Bob -- secure distributed lossless compression. Application examples to secure lossy source coding of Gaussian and binary sources in the presence of Gaussian and binary/ternary (respectively) side informations are also considered. Optimal coding schemes are characterized for some cases of interest where the statistical differences between the side information at the decoders and the presence of a nonzero distortion at Bob can be fully exploited to guarantee secrecy. [PUBLICATION ABSTRACT]
Author Villard, J.
Piantanida, P.
Author_xml – sequence: 1
  givenname: J.
  surname: Villard
  fullname: Villard, J.
  email: joffrey.villard@supelec.fr
  organization: Dept. of Telecommun., SUPELEC, Gif-sur-Yvette, France
– sequence: 2
  givenname: P.
  surname: Piantanida
  fullname: Piantanida, P.
  email: pablo.piantanida@supelec.fr
  organization: Dept. of Telecommun., SUPELEC, Gif-sur-Yvette, France
BackLink http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=27401076$$DView record in Pascal Francis
https://centralesupelec.hal.science/hal-00831695$$DView record in HAL
BookMark eNp9kUGP0zAQhS20SHQX7khcLCEOHFLGiZ04x1W1sJWKOLSIozVxJtSrNC62uxL_HodWPXDgYsuj772Z8btlN5OfiLG3ApZCQPtpt94tSxDVsiylqlr5gi2EUk3R1kresAWA0EUrpX7FbmN8yk-pRLlgmy3ZUyD-9TQmlygc3IQj3_pTsMRXvnfTT_7DpT3fup74ehp8OGByfuKYeNoTf8Bnin3wxyOF1-zlgGOkN5f7jn3__LBbPRabb1_Wq_tNYSulUkF5vtpCOUAthgbFfLaqazoFWlekUPa9xN6CbXIBdKcGRKlq0WV5p7vqjn08--5xNMfgDhh-G4_OPN5vzFwD0JWoW_UsMvv-zB6D_3WimMxTXi4vGY3IdkqVoHSmPlwojBbHIeBkXbx6l40EAU2dOThzNvgYAw1XRICZczA5BzPnYC45ZEn9j8S69PcLU0A3_k_47ix0RHTtU8-5Nbr6A4OIlLI
CODEN IETTAW
CitedBy_id crossref_primary_10_1109_TIT_2013_2288256
crossref_primary_10_1109_TIT_2023_3327151
crossref_primary_10_1109_TIT_2014_2337297
crossref_primary_10_1109_TSIPN_2016_2612122
crossref_primary_10_3390_e24121716
crossref_primary_10_1109_TIT_2018_2792495
crossref_primary_10_1109_TIFS_2015_2404134
crossref_primary_10_1109_TIT_2020_2980789
crossref_primary_10_1109_TIT_2016_2572727
crossref_primary_10_1109_TIT_2016_2609401
crossref_primary_10_1109_TIT_2020_3026061
crossref_primary_10_1109_TIFS_2024_3522775
crossref_primary_10_1109_TIT_2012_2236973
crossref_primary_10_1109_TIT_2016_2570011
crossref_primary_10_1109_TAES_2017_2649178
crossref_primary_10_1109_TIT_2015_2487448
crossref_primary_10_1109_TIT_2013_2259613
crossref_primary_10_1109_TIT_2015_2466697
crossref_primary_10_3390_e22060665
crossref_primary_10_1109_TIT_2019_2922634
crossref_primary_10_1109_TIT_2024_3371065
Cites_doi 10.1109/TIT.2002.808103
10.1109/ITW.2009.5351456
10.1109/TIT.1975.1055374
10.1109/18.243431
10.1109/18.256484
10.1109/TIT.1985.1057103
10.1109/TIT.2008.2006399
10.1109/ITW.2007.4313115
10.1109/ALLERTON.2009.5394933
10.1109/18.490552
10.1109/TIT.2002.806135
10.1109/TIT.2010.2054310
10.1002/j.1538-7305.1949.tb00928.x
10.1109/ISIT.2010.5513514
10.1109/TIT.1987.1057384
10.1109/TIT.2009.2034791
10.1109/18.272457
10.1002/j.1538-7305.1975.tb02040.x
10.1109/18.340475
10.1109/ISIT.2010.5513794
10.1109/TIT.1983.1056749
10.1109/TIT.2002.1003821
10.1109/18.568694
10.1016/0004-3702(86)90072-X
10.1109/TIT.1975.1055469
10.1109/TIT.2007.901143
10.1109/TIT.2008.921678
10.1109/ISIT.2008.4594958
10.1109/18.669162
10.1109/CISS.2008.4558665
10.1109/TIT.2010.2046238
10.1109/ALLERTON.2010.5706980
10.1109/TIT.1973.1055037
10.1109/ALLERTON.2008.4797642
10.1109/18.32119
10.1109/ISIT.2010.5513288
10.1109/TIT.1976.1055508
10.1109/TIT.2008.920343
10.1109/TIT.2007.911157
10.1109/18.641555
10.1109/TIT.1982.1056586
10.1109/TIT.2005.850110
10.1109/TIT.1978.1055892
10.1109/TIT.2008.917687
10.1109/TIT.2005.864448
10.1109/TIT.2010.2090215
10.1109/ITW.2007.4313097
10.1109/ITW.2008.4578644
10.1109/TIT.2008.921909
10.1109/TIT.2008.921858
10.1109/LCOMM.2002.804244
10.1109/TIT.2010.2090193
10.1109/TIT.1979.1056105
10.1109/ALLERTON.2009.5394875
10.1007/978-1-4419-1385-2
10.1109/TIT.2007.901190
10.1109/TIT.1980.1056192
10.1109/TIT.2006.889697
10.1109/TIT.1980.1056166
10.1109/TIT.2007.894680
10.1109/18.9781
10.1109/TIT.1973.1055107
ContentType Journal Article
Copyright 2014 INIST-CNRS
Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jun 2013
Distributed under a Creative Commons Attribution 4.0 International License
Copyright_xml – notice: 2014 INIST-CNRS
– notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jun 2013
– notice: Distributed under a Creative Commons Attribution 4.0 International License
DBID 97E
RIA
RIE
AAYXX
CITATION
IQODW
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
1XC
DOI 10.1109/TIT.2013.2245394
DatabaseName IEEE Xplore (IEEE)
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Pascal-Francis
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Hyper Article en Ligne (HAL)
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Technology Research Database

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
Applied Sciences
Mathematics
EISSN 1557-9654
EndPage 3692
ExternalDocumentID oai:HAL:hal-00831695v1
2980469911
27401076
10_1109_TIT_2013_2245394
6451278
Genre orig-research
GroupedDBID -~X
.DC
0R~
29I
3EH
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABFSI
ABQJQ
ABVLG
ACGFO
ACGFS
ACGOD
ACIWK
AENEX
AETEA
AETIX
AGQYO
AGSQL
AHBIQ
AI.
AIBXA
AKJIK
AKQYR
ALLEH
ALMA_UNASSIGNED_HOLDINGS
ASUFR
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
E.L
EBS
EJD
F5P
HZ~
H~9
IAAWW
IBMZZ
ICLAB
IDIHD
IFIPE
IFJZH
IPLJI
JAVBF
LAI
M43
MS~
O9-
OCL
P2P
PQQKQ
RIA
RIE
RNS
RXW
TAE
TN5
VH1
VJK
AAYXX
CITATION
IQODW
RIG
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
1XC
ID FETCH-LOGICAL-c355t-e5396c02f061f7a161f795b7b50883e5a4dd4adc0c708808b5faa4561b355b8b3
IEDL.DBID RIE
ISICitedReferencesCount 52
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000320709800029&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0018-9448
IngestDate Sat Nov 29 15:14:57 EST 2025
Sun Jun 29 16:52:26 EDT 2025
Mon Jul 21 09:13:58 EDT 2025
Tue Nov 18 22:17:19 EST 2025
Sat Nov 29 03:53:15 EST 2025
Tue Aug 26 16:39:30 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 6
Keywords eavesdropper
Lossless circuit
Source coding
Coding circuit
Binary signal
Distributed source signal
Rate distortion theory
side information
Lossless compression
Lossy medium
Decoding
Random codes
Distributed source coding
equivocation-rate
Wyner-Ziv coding
rate-distortion region
Unification
Optimal code
Wyner Ziv problem
Optimal planning
Secrecy
Private sector
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
CC BY 4.0
Distributed under a Creative Commons Attribution 4.0 International License: http://creativecommons.org/licenses/by/4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c355t-e5396c02f061f7a161f795b7b50883e5a4dd4adc0c708808b5faa4561b355b8b3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-8717-2117
PQID 1355552058
PQPubID 36024
PageCount 25
ParticipantIDs pascalfrancis_primary_27401076
crossref_primary_10_1109_TIT_2013_2245394
proquest_journals_1355552058
ieee_primary_6451278
hal_primary_oai_HAL_hal_00831695v1
crossref_citationtrail_10_1109_TIT_2013_2245394
PublicationCentury 2000
PublicationDate 2013-06-01
PublicationDateYYYYMMDD 2013-06-01
PublicationDate_xml – month: 06
  year: 2013
  text: 2013-06-01
  day: 01
PublicationDecade 2010
PublicationPlace New York, NY
PublicationPlace_xml – name: New York, NY
– name: New York
PublicationTitle IEEE transactions on information theory
PublicationTitleAbbrev TIT
PublicationYear 2013
Publisher IEEE
Institute of Electrical and Electronics Engineers
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: Institute of Electrical and Electronics Engineers
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref57
ref13
ref12
ref59
ref15
ref58
ref14
ref53
oggier (ref39) 2011; 1103 4086
ref52
ref11
ref54
ref10
ref17
ref16
ref18
gamal (ref55) 2010
villard (ref71) 2011
csiszar (ref66) 1982
ref51
timo (ref19) 2010; 901 1705
ref50
muramatsu (ref38) 2009
ref46
ref45
ref48
ref47
ref42
ref41
ref44
ref43
berger (ref4) 1977
cover (ref56) 2006
ref49
ref8
ref7
ref9
ref3
ref6
ref5
ref40
ref35
ref37
ref36
ref31
liang (ref34) 2009
ref30
ref33
ref32
ref2
ref1
ref70
ref68
ref24
ref67
ref23
ref26
ref69
ref25
ref64
ref20
ref63
ref22
ref65
ref21
ref28
ref27
ref29
ref60
ref62
ref61
References_xml – ident: ref25
  doi: 10.1109/TIT.2002.808103
– ident: ref37
  doi: 10.1109/ITW.2009.5351456
– year: 2009
  ident: ref34
  publication-title: Information Theoretic Security
– ident: ref2
  doi: 10.1109/TIT.1975.1055374
– ident: ref43
  doi: 10.1109/18.243431
– ident: ref44
  doi: 10.1109/18.256484
– ident: ref14
  doi: 10.1109/TIT.1985.1057103
– ident: ref18
  doi: 10.1109/TIT.2008.2006399
– ident: ref51
  doi: 10.1109/ITW.2007.4313115
– ident: ref7
  doi: 10.1109/ALLERTON.2009.5394933
– ident: ref63
  doi: 10.1109/18.490552
– ident: ref69
  doi: 10.1109/TIT.2002.806135
– ident: ref57
  doi: 10.1109/TIT.2010.2054310
– ident: ref26
  doi: 10.1002/j.1538-7305.1949.tb00928.x
– ident: ref40
  doi: 10.1109/ISIT.2010.5513514
– start-page: 105
  year: 2009
  ident: ref38
  article-title: Construction of wiretap channel codes by using sparse matrices
  publication-title: Proc IEEE Inf Theory Workshop
– ident: ref62
  doi: 10.1109/TIT.1987.1057384
– ident: ref20
  doi: 10.1109/TIT.2009.2034791
– ident: ref47
  doi: 10.1109/18.272457
– year: 1977
  ident: ref4
  publication-title: Multiterminal source coding
– ident: ref27
  doi: 10.1002/j.1538-7305.1975.tb02040.x
– ident: ref15
  doi: 10.1109/18.340475
– ident: ref42
  doi: 10.1109/ISIT.2010.5513794
– ident: ref45
  doi: 10.1109/TIT.1983.1056749
– ident: ref22
  doi: 10.1109/TIT.2002.1003821
– ident: ref48
  doi: 10.1109/18.568694
– ident: ref68
  doi: 10.1016/0004-3702(86)90072-X
– ident: ref3
  doi: 10.1109/TIT.1975.1055469
– ident: ref41
  doi: 10.1109/TIT.2007.901143
– ident: ref29
  doi: 10.1109/TIT.2008.921678
– ident: ref54
  doi: 10.1109/ISIT.2008.4594958
– ident: ref65
  doi: 10.1109/18.669162
– year: 1982
  ident: ref66
  publication-title: Information Theory Coding Theorems for Discrete Memoryless Systems
– ident: ref6
  doi: 10.1109/CISS.2008.4558665
– ident: ref67
  doi: 10.1109/TIT.2010.2046238
– ident: ref70
  doi: 10.1109/ALLERTON.2010.5706980
– ident: ref1
  doi: 10.1109/TIT.1973.1055037
– ident: ref30
  doi: 10.1109/ALLERTON.2008.4797642
– volume: 1103 4086
  start-page: 1
  year: 2011
  ident: ref39
  article-title: Lattice codes for the wiretap Gaussian channel: Construction and analysis
  publication-title: arXiv cs IT
– ident: ref9
  doi: 10.1109/18.32119
– ident: ref21
  doi: 10.1109/ISIT.2010.5513288
– ident: ref8
  doi: 10.1109/TIT.1976.1055508
– ident: ref11
  doi: 10.1109/TIT.2008.920343
– ident: ref31
  doi: 10.1109/TIT.2007.911157
– ident: ref10
  doi: 10.1109/18.641555
– ident: ref16
  doi: 10.1109/TIT.1982.1056586
– ident: ref61
  doi: 10.1109/TIT.2005.850110
– ident: ref28
  doi: 10.1109/TIT.1978.1055892
– ident: ref64
  doi: 10.1109/TIT.2008.917687
– year: 2011
  ident: ref71
  article-title: Secure distributed lossless compression with side information at the eavesdropper
  publication-title: Proc Int ICST Workshop Secure Wireless Netw
– ident: ref49
  doi: 10.1109/TIT.2005.864448
– ident: ref32
  doi: 10.1109/TIT.2010.2090215
– ident: ref36
  doi: 10.1109/ITW.2007.4313097
– ident: ref52
  doi: 10.1109/ITW.2008.4578644
– ident: ref33
  doi: 10.1109/TIT.2008.921909
– volume: 901 1705
  start-page: 1
  year: 2010
  ident: ref19
  article-title: Rate distortion with side-information at many decoders
  publication-title: arXiv cs IT
– ident: ref50
  doi: 10.1109/TIT.2008.921858
– ident: ref23
  doi: 10.1109/LCOMM.2002.804244
– year: 2010
  ident: ref55
  article-title: Lecture notes on network information theory
  publication-title: arXiv 1001 3404
– ident: ref60
  doi: 10.1109/TIT.2010.2090193
– ident: ref5
  doi: 10.1109/TIT.1979.1056105
– ident: ref53
  doi: 10.1109/ALLERTON.2009.5394875
– ident: ref35
  doi: 10.1007/978-1-4419-1385-2
– ident: ref17
  doi: 10.1109/TIT.2007.901190
– ident: ref12
  doi: 10.1109/TIT.1980.1056192
– ident: ref24
  doi: 10.1109/TIT.2006.889697
– ident: ref13
  doi: 10.1109/TIT.1980.1056166
– year: 2006
  ident: ref56
  publication-title: Elements of Information Theory
– ident: ref59
  doi: 10.1109/TIT.2007.894680
– ident: ref46
  doi: 10.1109/18.9781
– ident: ref58
  doi: 10.1109/TIT.1973.1055107
SSID ssj0014512
Score 2.3706374
Snippet The problem of secure multiterminal source coding with side information at the eavesdropper is investigated. This scenario consists of a main encoder (referred...
SourceID hal
proquest
pascalfrancis
crossref
ieee
SourceType Open Access Repository
Aggregation Database
Index Database
Enrichment Source
Publisher
StartPage 3668
SubjectTerms Applied sciences
Coding theory
Coding, codes
Computer Science
Correlation analysis
Decoding
Distributed source coding
eavesdropper
equivocation-rate
Exact sciences and technology
Information Theory
Information, signal and communications theory
Markov processes
Mathematics
random codes
Random variables
rate-distortion region
Receivers
Requirements
secrecy
Secret
Security
side information
Signal and communications theory
Source coding
Systems, networks and services of telecommunications
Telecommunications
Telecommunications and information theory
Uncertainty
Wyner-Ziv coding
Title Secure Multiterminal Source Coding With Side Information at the Eavesdropper
URI https://ieeexplore.ieee.org/document/6451278
https://www.proquest.com/docview/1355552058
https://centralesupelec.hal.science/hal-00831695
Volume 59
WOSCitedRecordID wos000320709800029&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Electronic Library (IEL)
  customDbUrl:
  eissn: 1557-9654
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0014512
  issn: 0018-9448
  databaseCode: RIE
  dateStart: 19630101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1bS-wwEB5c8UEfjndOvRHkvAjWTS9pmkcRRWERwT3oW0nSKS7I7rJb9_ebSbtFUQRfSsmllPmSzCSZmQ_gn8IsyowxYYYqDVO0GCpl4jCy0oqyMlYaj_RA3t_nz8_qYQXOu1gYRPTOZ3hBr_4uv5zYNzoq62epU08y70FPyqyJ1epuDKiqWXXdBHZ7juWVJFf94d2QfLiSC6euRKLSTyqo90IOkJ5Zhfwi9dyJpmo4Lb4sz17n3Gz-7m-34E9rW7LLZjBswwqOd2BzydvA2mm8AxsfkhDuwsAfuSNrQnEb35hX9ugP9dnVhHQbexrVL-xxVCJrw5cITqZr5sxHdq0XOC9nk-kUZ3vw_-Z6eHUbthwLoXWWRh2iE0hmeVw5vV5JHdFTCSMNGW4JCp2WZapLy610BTw3otKajC7jupvcJPuwOp6M8S8wjmkurLUij6pUxdoYZ7jHhktUOlElD6C_FHth2wTkxIPxWviNCFeFA6ogoIoWqADOuh7TJvnGD21PHZJdM8qafXs5KKjMs6llSiyiAHYJp65VC1EAJ5-A7-pj4ivkMgvgaDkSinaOz4vISUCImIv84PvPHsJ63JBnhDw6gtV69obHsGYX9Wg-O_HD9x2JA-vJ
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3da9swED_6MVj70G7tRt12nRh7GcyNbEuW9VhKS0q9MGjG-iYk-UwDJQmJm7-_kuyYlo3BXozRhzH3k3Qn6e5-AF8l5klujIlzlCxmaDGW0qRxYoXlVW2sMAHpUoxGxf29_LkB3_tYGEQMzmd47l_DXX41s0_-qGyQM6eeRLEJ25yxlLbRWv2dga9s1103hd2uY30pSeVgfDP2XlzZuVNYPJPslRLafPAukIFbxXtG6qUTTt2yWvyxQAetc73_f__7DvY665JctMPhPWzg9AD218wNpJvIB7D7Ig3hIZTh0B1JG4zbesc8krtwrE8uZ167kd-T5oHcTSokXQCTB5TohjgDklzpFS6rxWw-x8UH-HV9Nb4cxh3LQmydrdHE6ASSW5rWTrPXQif-KbkRxptuGXLNqorpylIrXAEtDK-19maXcd1NYbKPsDWdTfEICEVWcGstL5KayVQb40z31FCBUmeyohEM1mJXtktB7pkwHlXYilCpHFDKA6U6oCL41veYt-k3_tH2i0Oyb-bzZg8vSuXLAp9aLvkqieDQ49S36iCK4OwV8H196hkLqcgjOF2PBNXN8qVKnAQ4Tykvjv_-2c_wdjj-UaryZnR7AjtpS6UR0-QUtprFE36CN3bVTJaLszCUnwHyaO8Q
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secure+Multiterminal+Source+Coding+With+Side+Information+at+the+Eavesdropper&rft.jtitle=IEEE+transactions+on+information+theory&rft.au=Villard%2C+J&rft.au=Piantanida%2C+P&rft.date=2013-06-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=0018-9448&rft.eissn=1557-9654&rft.volume=59&rft.issue=6&rft.spage=3668&rft_id=info:doi/10.1109%2FTIT.2013.2245394&rft.externalDBID=NO_FULL_TEXT&rft.externalDocID=2980469911
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0018-9448&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0018-9448&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0018-9448&client=summon