Secure Multiterminal Source Coding With Side Information at the Eavesdropper
The problem of secure multiterminal source coding with side information at the eavesdropper is investigated. This scenario consists of a main encoder (referred to as Alice) that wishes to compress a single source but simultaneously satisfying the desired requirements on the distortion level at a leg...
Uloženo v:
| Vydáno v: | IEEE transactions on information theory Ročník 59; číslo 6; s. 3668 - 3692 |
|---|---|
| Hlavní autoři: | , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
New York, NY
IEEE
01.06.2013
Institute of Electrical and Electronics Engineers The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Témata: | |
| ISSN: | 0018-9448, 1557-9654 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | The problem of secure multiterminal source coding with side information at the eavesdropper is investigated. This scenario consists of a main encoder (referred to as Alice) that wishes to compress a single source but simultaneously satisfying the desired requirements on the distortion level at a legitimate receiver (referred to as Bob) and the equivocation rate-average uncertainty-at an eavesdropper (referred to as Eve). It is further assumed the presence of a (public) rate-limited link between Alice and Bob. In this setting, Eve perfectly observes the information bits sent by Alice to Bob and has also access to a correlated source which can be used as side information. A second encoder (referred to as Charlie) helps Bob in estimating Alice's source by sending a compressed version of its own correlated observation via a (private) rate-limited link, which is only observed by Bob. For instance, the problem at hands can be seen as the unification between the Berger-Tung and the secure source coding setups. Inner and outer bounds on the so-called rate-distortion-equivocation region are derived. The inner region turns to be tight for two cases: 1) uncoded side information at Bob and 2) lossless reconstruction of both sources at Bob-secure distributed lossless compression. Application examples to secure lossy source coding of Gaussian and binary sources in the presence of Gaussian and binary/ternary (respectively) side informations are also considered. Optimal coding schemes are characterized for some cases of interest where the statistical differences between the side information at the decoders and the presence of a nonzero distortion at Bob can be fully exploited to guarantee secrecy. |
|---|---|
| AbstractList | The problem of secure multiterminal source coding with side information at the eavesdropper is investigated. This scenario consists of a main encoder (referred to as Alice) that wishes to compress a single source but simultaneously satisfying the desired requirements on the distortion level at a legitimate receiver (referred to as Bob) and the equivocation rate-average uncertainty-at an eavesdropper (referred to as Eve). It is further assumed the presence of a (public) rate-limited link between Alice and Bob. In this setting, Eve perfectly observes the information bits sent by Alice to Bob and has also access to a correlated source which can be used as side information. A second encoder (referred to as Charlie) helps Bob in estimating Alice's source by sending a compressed version of its own correlated observation via a (private) rate-limited link, which is only observed by Bob. For instance, the problem at hands can be seen as the unification between the Berger-Tung and the secure source coding setups. Inner and outer bounds on the so-called rate-distortion-equivocation region are derived. The inner region turns to be tight for two cases: 1) uncoded side information at Bob and 2) lossless reconstruction of both sources at Bob-secure distributed lossless compression. Application examples to secure lossy source coding of Gaussian and binary sources in the presence of Gaussian and binary/ternary (respectively) side informations are also considered. Optimal coding schemes are characterized for some cases of interest where the statistical differences between the side information at the decoders and the presence of a nonzero distortion at Bob can be fully exploited to guarantee secrecy. The problem of secure multiterminal source coding with side information at the eavesdropper is investigated. This scenario consists of a main encoder (referred to as Alice) that wishes to compress a single source but simultaneously satisfying the desired requirements on the distortion level at a legitimate receiver (referred to as Bob) and the equivocation rate -- average uncertainty -- at an eavesdropper (referred to as Eve). It is further assumed the presence of a (public) rate-limited link between Alice and Bob. In this setting, Eve perfectly observes the information bits sent by Alice to Bob and has also access to a correlated source which can be used as side information. A second encoder (referred to as Charlie) helps Bob in estimating Alice's source by sending a compressed version of its own correlated observation via a (private) rate-limited link, which is only observed by Bob. For instance, the problem at hands can be seen as the unification between the Berger-Tung and the secure source coding setups. Inner and outer bounds on the so-called rate-distortion-equivocation region are derived. The inner region turns to be tight for two cases: 1) uncoded side information at Bob and 2) lossless reconstruction of both sources at Bob -- secure distributed lossless compression. Application examples to secure lossy source coding of Gaussian and binary sources in the presence of Gaussian and binary/ternary (respectively) side informations are also considered. Optimal coding schemes are characterized for some cases of interest where the statistical differences between the side information at the decoders and the presence of a nonzero distortion at Bob can be fully exploited to guarantee secrecy. [PUBLICATION ABSTRACT] |
| Author | Villard, J. Piantanida, P. |
| Author_xml | – sequence: 1 givenname: J. surname: Villard fullname: Villard, J. email: joffrey.villard@supelec.fr organization: Dept. of Telecommun., SUPELEC, Gif-sur-Yvette, France – sequence: 2 givenname: P. surname: Piantanida fullname: Piantanida, P. email: pablo.piantanida@supelec.fr organization: Dept. of Telecommun., SUPELEC, Gif-sur-Yvette, France |
| BackLink | http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=27401076$$DView record in Pascal Francis https://centralesupelec.hal.science/hal-00831695$$DView record in HAL |
| BookMark | eNp9kUGP0zAQhS20SHQX7khcLCEOHFLGiZ04x1W1sJWKOLSIozVxJtSrNC62uxL_HodWPXDgYsuj772Z8btlN5OfiLG3ApZCQPtpt94tSxDVsiylqlr5gi2EUk3R1kresAWA0EUrpX7FbmN8yk-pRLlgmy3ZUyD-9TQmlygc3IQj3_pTsMRXvnfTT_7DpT3fup74ehp8OGByfuKYeNoTf8Bnin3wxyOF1-zlgGOkN5f7jn3__LBbPRabb1_Wq_tNYSulUkF5vtpCOUAthgbFfLaqazoFWlekUPa9xN6CbXIBdKcGRKlq0WV5p7vqjn08--5xNMfgDhh-G4_OPN5vzFwD0JWoW_UsMvv-zB6D_3WimMxTXi4vGY3IdkqVoHSmPlwojBbHIeBkXbx6l40EAU2dOThzNvgYAw1XRICZczA5BzPnYC45ZEn9j8S69PcLU0A3_k_47ix0RHTtU8-5Nbr6A4OIlLI |
| CODEN | IETTAW |
| CitedBy_id | crossref_primary_10_1109_TIT_2013_2288256 crossref_primary_10_1109_TIT_2023_3327151 crossref_primary_10_1109_TIT_2014_2337297 crossref_primary_10_1109_TSIPN_2016_2612122 crossref_primary_10_3390_e24121716 crossref_primary_10_1109_TIT_2018_2792495 crossref_primary_10_1109_TIFS_2015_2404134 crossref_primary_10_1109_TIT_2020_2980789 crossref_primary_10_1109_TIT_2016_2572727 crossref_primary_10_1109_TIT_2016_2609401 crossref_primary_10_1109_TIT_2020_3026061 crossref_primary_10_1109_TIFS_2024_3522775 crossref_primary_10_1109_TIT_2012_2236973 crossref_primary_10_1109_TIT_2016_2570011 crossref_primary_10_1109_TAES_2017_2649178 crossref_primary_10_1109_TIT_2015_2487448 crossref_primary_10_1109_TIT_2013_2259613 crossref_primary_10_1109_TIT_2015_2466697 crossref_primary_10_3390_e22060665 crossref_primary_10_1109_TIT_2019_2922634 crossref_primary_10_1109_TIT_2024_3371065 |
| Cites_doi | 10.1109/TIT.2002.808103 10.1109/ITW.2009.5351456 10.1109/TIT.1975.1055374 10.1109/18.243431 10.1109/18.256484 10.1109/TIT.1985.1057103 10.1109/TIT.2008.2006399 10.1109/ITW.2007.4313115 10.1109/ALLERTON.2009.5394933 10.1109/18.490552 10.1109/TIT.2002.806135 10.1109/TIT.2010.2054310 10.1002/j.1538-7305.1949.tb00928.x 10.1109/ISIT.2010.5513514 10.1109/TIT.1987.1057384 10.1109/TIT.2009.2034791 10.1109/18.272457 10.1002/j.1538-7305.1975.tb02040.x 10.1109/18.340475 10.1109/ISIT.2010.5513794 10.1109/TIT.1983.1056749 10.1109/TIT.2002.1003821 10.1109/18.568694 10.1016/0004-3702(86)90072-X 10.1109/TIT.1975.1055469 10.1109/TIT.2007.901143 10.1109/TIT.2008.921678 10.1109/ISIT.2008.4594958 10.1109/18.669162 10.1109/CISS.2008.4558665 10.1109/TIT.2010.2046238 10.1109/ALLERTON.2010.5706980 10.1109/TIT.1973.1055037 10.1109/ALLERTON.2008.4797642 10.1109/18.32119 10.1109/ISIT.2010.5513288 10.1109/TIT.1976.1055508 10.1109/TIT.2008.920343 10.1109/TIT.2007.911157 10.1109/18.641555 10.1109/TIT.1982.1056586 10.1109/TIT.2005.850110 10.1109/TIT.1978.1055892 10.1109/TIT.2008.917687 10.1109/TIT.2005.864448 10.1109/TIT.2010.2090215 10.1109/ITW.2007.4313097 10.1109/ITW.2008.4578644 10.1109/TIT.2008.921909 10.1109/TIT.2008.921858 10.1109/LCOMM.2002.804244 10.1109/TIT.2010.2090193 10.1109/TIT.1979.1056105 10.1109/ALLERTON.2009.5394875 10.1007/978-1-4419-1385-2 10.1109/TIT.2007.901190 10.1109/TIT.1980.1056192 10.1109/TIT.2006.889697 10.1109/TIT.1980.1056166 10.1109/TIT.2007.894680 10.1109/18.9781 10.1109/TIT.1973.1055107 |
| ContentType | Journal Article |
| Copyright | 2014 INIST-CNRS Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jun 2013 Distributed under a Creative Commons Attribution 4.0 International License |
| Copyright_xml | – notice: 2014 INIST-CNRS – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jun 2013 – notice: Distributed under a Creative Commons Attribution 4.0 International License |
| DBID | 97E RIA RIE AAYXX CITATION IQODW 7SC 7SP 8FD JQ2 L7M L~C L~D 1XC |
| DOI | 10.1109/TIT.2013.2245394 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Pascal-Francis Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Hyper Article en Ligne (HAL) |
| DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Technology Research Database |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science Applied Sciences Mathematics |
| EISSN | 1557-9654 |
| EndPage | 3692 |
| ExternalDocumentID | oai:HAL:hal-00831695v1 2980469911 27401076 10_1109_TIT_2013_2245394 6451278 |
| Genre | orig-research |
| GroupedDBID | -~X .DC 0R~ 29I 3EH 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABFSI ABQJQ ABVLG ACGFO ACGFS ACGOD ACIWK AENEX AETEA AETIX AGQYO AGSQL AHBIQ AI. AIBXA AKJIK AKQYR ALLEH ALMA_UNASSIGNED_HOLDINGS ASUFR ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 E.L EBS EJD F5P HZ~ H~9 IAAWW IBMZZ ICLAB IDIHD IFIPE IFJZH IPLJI JAVBF LAI M43 MS~ O9- OCL P2P PQQKQ RIA RIE RNS RXW TAE TN5 VH1 VJK AAYXX CITATION IQODW RIG 7SC 7SP 8FD JQ2 L7M L~C L~D 1XC |
| ID | FETCH-LOGICAL-c355t-e5396c02f061f7a161f795b7b50883e5a4dd4adc0c708808b5faa4561b355b8b3 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 52 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000320709800029&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0018-9448 |
| IngestDate | Sat Nov 29 15:14:57 EST 2025 Sun Jun 29 16:52:26 EDT 2025 Mon Jul 21 09:13:58 EDT 2025 Tue Nov 18 22:17:19 EST 2025 Sat Nov 29 03:53:15 EST 2025 Tue Aug 26 16:39:30 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 6 |
| Keywords | eavesdropper Lossless circuit Source coding Coding circuit Binary signal Distributed source signal Rate distortion theory side information Lossless compression Lossy medium Decoding Random codes Distributed source coding equivocation-rate Wyner-Ziv coding rate-distortion region Unification Optimal code Wyner Ziv problem Optimal planning Secrecy Private sector |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html CC BY 4.0 Distributed under a Creative Commons Attribution 4.0 International License: http://creativecommons.org/licenses/by/4.0 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c355t-e5396c02f061f7a161f795b7b50883e5a4dd4adc0c708808b5faa4561b355b8b3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-8717-2117 |
| PQID | 1355552058 |
| PQPubID | 36024 |
| PageCount | 25 |
| ParticipantIDs | pascalfrancis_primary_27401076 crossref_primary_10_1109_TIT_2013_2245394 proquest_journals_1355552058 ieee_primary_6451278 hal_primary_oai_HAL_hal_00831695v1 crossref_citationtrail_10_1109_TIT_2013_2245394 |
| PublicationCentury | 2000 |
| PublicationDate | 2013-06-01 |
| PublicationDateYYYYMMDD | 2013-06-01 |
| PublicationDate_xml | – month: 06 year: 2013 text: 2013-06-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationPlace | New York, NY |
| PublicationPlace_xml | – name: New York, NY – name: New York |
| PublicationTitle | IEEE transactions on information theory |
| PublicationTitleAbbrev | TIT |
| PublicationYear | 2013 |
| Publisher | IEEE Institute of Electrical and Electronics Engineers The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: Institute of Electrical and Electronics Engineers – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | ref57 ref13 ref12 ref59 ref15 ref58 ref14 ref53 oggier (ref39) 2011; 1103 4086 ref52 ref11 ref54 ref10 ref17 ref16 ref18 gamal (ref55) 2010 villard (ref71) 2011 csiszar (ref66) 1982 ref51 timo (ref19) 2010; 901 1705 ref50 muramatsu (ref38) 2009 ref46 ref45 ref48 ref47 ref42 ref41 ref44 ref43 berger (ref4) 1977 cover (ref56) 2006 ref49 ref8 ref7 ref9 ref3 ref6 ref5 ref40 ref35 ref37 ref36 ref31 liang (ref34) 2009 ref30 ref33 ref32 ref2 ref1 ref70 ref68 ref24 ref67 ref23 ref26 ref69 ref25 ref64 ref20 ref63 ref22 ref65 ref21 ref28 ref27 ref29 ref60 ref62 ref61 |
| References_xml | – ident: ref25 doi: 10.1109/TIT.2002.808103 – ident: ref37 doi: 10.1109/ITW.2009.5351456 – year: 2009 ident: ref34 publication-title: Information Theoretic Security – ident: ref2 doi: 10.1109/TIT.1975.1055374 – ident: ref43 doi: 10.1109/18.243431 – ident: ref44 doi: 10.1109/18.256484 – ident: ref14 doi: 10.1109/TIT.1985.1057103 – ident: ref18 doi: 10.1109/TIT.2008.2006399 – ident: ref51 doi: 10.1109/ITW.2007.4313115 – ident: ref7 doi: 10.1109/ALLERTON.2009.5394933 – ident: ref63 doi: 10.1109/18.490552 – ident: ref69 doi: 10.1109/TIT.2002.806135 – ident: ref57 doi: 10.1109/TIT.2010.2054310 – ident: ref26 doi: 10.1002/j.1538-7305.1949.tb00928.x – ident: ref40 doi: 10.1109/ISIT.2010.5513514 – start-page: 105 year: 2009 ident: ref38 article-title: Construction of wiretap channel codes by using sparse matrices publication-title: Proc IEEE Inf Theory Workshop – ident: ref62 doi: 10.1109/TIT.1987.1057384 – ident: ref20 doi: 10.1109/TIT.2009.2034791 – ident: ref47 doi: 10.1109/18.272457 – year: 1977 ident: ref4 publication-title: Multiterminal source coding – ident: ref27 doi: 10.1002/j.1538-7305.1975.tb02040.x – ident: ref15 doi: 10.1109/18.340475 – ident: ref42 doi: 10.1109/ISIT.2010.5513794 – ident: ref45 doi: 10.1109/TIT.1983.1056749 – ident: ref22 doi: 10.1109/TIT.2002.1003821 – ident: ref48 doi: 10.1109/18.568694 – ident: ref68 doi: 10.1016/0004-3702(86)90072-X – ident: ref3 doi: 10.1109/TIT.1975.1055469 – ident: ref41 doi: 10.1109/TIT.2007.901143 – ident: ref29 doi: 10.1109/TIT.2008.921678 – ident: ref54 doi: 10.1109/ISIT.2008.4594958 – ident: ref65 doi: 10.1109/18.669162 – year: 1982 ident: ref66 publication-title: Information Theory Coding Theorems for Discrete Memoryless Systems – ident: ref6 doi: 10.1109/CISS.2008.4558665 – ident: ref67 doi: 10.1109/TIT.2010.2046238 – ident: ref70 doi: 10.1109/ALLERTON.2010.5706980 – ident: ref1 doi: 10.1109/TIT.1973.1055037 – ident: ref30 doi: 10.1109/ALLERTON.2008.4797642 – volume: 1103 4086 start-page: 1 year: 2011 ident: ref39 article-title: Lattice codes for the wiretap Gaussian channel: Construction and analysis publication-title: arXiv cs IT – ident: ref9 doi: 10.1109/18.32119 – ident: ref21 doi: 10.1109/ISIT.2010.5513288 – ident: ref8 doi: 10.1109/TIT.1976.1055508 – ident: ref11 doi: 10.1109/TIT.2008.920343 – ident: ref31 doi: 10.1109/TIT.2007.911157 – ident: ref10 doi: 10.1109/18.641555 – ident: ref16 doi: 10.1109/TIT.1982.1056586 – ident: ref61 doi: 10.1109/TIT.2005.850110 – ident: ref28 doi: 10.1109/TIT.1978.1055892 – ident: ref64 doi: 10.1109/TIT.2008.917687 – year: 2011 ident: ref71 article-title: Secure distributed lossless compression with side information at the eavesdropper publication-title: Proc Int ICST Workshop Secure Wireless Netw – ident: ref49 doi: 10.1109/TIT.2005.864448 – ident: ref32 doi: 10.1109/TIT.2010.2090215 – ident: ref36 doi: 10.1109/ITW.2007.4313097 – ident: ref52 doi: 10.1109/ITW.2008.4578644 – ident: ref33 doi: 10.1109/TIT.2008.921909 – volume: 901 1705 start-page: 1 year: 2010 ident: ref19 article-title: Rate distortion with side-information at many decoders publication-title: arXiv cs IT – ident: ref50 doi: 10.1109/TIT.2008.921858 – ident: ref23 doi: 10.1109/LCOMM.2002.804244 – year: 2010 ident: ref55 article-title: Lecture notes on network information theory publication-title: arXiv 1001 3404 – ident: ref60 doi: 10.1109/TIT.2010.2090193 – ident: ref5 doi: 10.1109/TIT.1979.1056105 – ident: ref53 doi: 10.1109/ALLERTON.2009.5394875 – ident: ref35 doi: 10.1007/978-1-4419-1385-2 – ident: ref17 doi: 10.1109/TIT.2007.901190 – ident: ref12 doi: 10.1109/TIT.1980.1056192 – ident: ref24 doi: 10.1109/TIT.2006.889697 – ident: ref13 doi: 10.1109/TIT.1980.1056166 – year: 2006 ident: ref56 publication-title: Elements of Information Theory – ident: ref59 doi: 10.1109/TIT.2007.894680 – ident: ref46 doi: 10.1109/18.9781 – ident: ref58 doi: 10.1109/TIT.1973.1055107 |
| SSID | ssj0014512 |
| Score | 2.3706374 |
| Snippet | The problem of secure multiterminal source coding with side information at the eavesdropper is investigated. This scenario consists of a main encoder (referred... |
| SourceID | hal proquest pascalfrancis crossref ieee |
| SourceType | Open Access Repository Aggregation Database Index Database Enrichment Source Publisher |
| StartPage | 3668 |
| SubjectTerms | Applied sciences Coding theory Coding, codes Computer Science Correlation analysis Decoding Distributed source coding eavesdropper equivocation-rate Exact sciences and technology Information Theory Information, signal and communications theory Markov processes Mathematics random codes Random variables rate-distortion region Receivers Requirements secrecy Secret Security side information Signal and communications theory Source coding Systems, networks and services of telecommunications Telecommunications Telecommunications and information theory Uncertainty Wyner-Ziv coding |
| Title | Secure Multiterminal Source Coding With Side Information at the Eavesdropper |
| URI | https://ieeexplore.ieee.org/document/6451278 https://www.proquest.com/docview/1355552058 https://centralesupelec.hal.science/hal-00831695 |
| Volume | 59 |
| WOSCitedRecordID | wos000320709800029&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 1557-9654 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0014512 issn: 0018-9448 databaseCode: RIE dateStart: 19630101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3dS8MwED-c-KAPfovziyC-CNalbdI0jyKKgojgRN9KmqY4GNvY6v5-79KuKIrgSyn5KOF-Se-S3N0P4My6iOtUuIDnlgdCaBOkRiQBFmleyjgJTe7JJtTjY_r2pp-W4KKNhXHOeeczd0mv_i6_GNsPOirrJQLVk0o70FEqqWO12hsDqqr_uriAcc-xuJLkute_75MPV3yJ6krGWnxTQZ13coD0zCrkF2lmKJqy5rT48Xv2Oud243-j3YT1xrZkV_Vk2IIlN9qGjQVvA2uW8TasfUlCuAMP_sjdsToUt_aNGbJnf6jPrsek29jroHpnz4PCsSZ8ieBkpmJoPrIbM3ezYjqeTNx0F15ub_rXd0HDsRBYtDSqwKFAEsujEvV6qUxITy1zlZPhFjtpRFEIU1huFRbwNJelMWR05dg9T_N4D5ZH45HbB5baMrZojsSldoIiupSxEXWUSSykTLrQW4g9s00CcuLBGGZ-I8J1hkBlBFTWANWF87bHpE6-8UfbU0SybUZZs--uHjIq82xqiZbzsAs7hFPbqoGoCyffgG_rI-Ir5AqHfrSYCVmzxmdZiBKQMuIyPfj9s4ewGtXkGQEPj2C5mn64Y1ix82owm5746fsJ3C3qQQ |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3dS-QwEB_8OFAf1PMDVz0Nx70I1k3bpG0eRZQV95YD99C3kKYpLsjuslv373cm7RbljoN7KSUfJcwv6UySmfkB_LAu4ioTLuC55YEQygSZEUmARYqXMk5Ck3uyiXQwyJ6f1a8VuGxjYZxz3vnMXdGrv8svJvaNjsq6iUD1lGarsC6FiHgdrdXeGVBl_d_FJYy7juWlJFfd4f2QvLjiK1RYMlbikxJafSEXSM-tQp6RZo7CKWtWiz9-0F7r3O3833h3YbuxLtl1PR2-woob78HOkrmBNQt5D7Y-pCHch74_dHesDsatvWNe2aM_1mc3E9Ju7GlUvbDHUeFYE8BEgDJTMTQg2a1ZuHkxm0ynbnYAv-9uhze9oGFZCCzaGlXgUCCJ5VGJmr1MTUhPJfM0J9MtdtKIohCmsNymWMCzXJbGkNmVY_c8y-NDWBtPxu4IWGbL2KJBEpfKCYrpSo2NqKNMYiFl0oHuUuzaNinIiQnjVfutCFcagdIElG6A6sBF22Nap9_4R9vviGTbjPJm9677mso8n1qi5CLswD7h1LZqIOrA2Sfg2_qIGAt5ikM_Xc4E3azyuQ5RAlJGXGbHf__sOWz0hj_7un8_eDiBzaim0gh4eApr1ezNfYMvdlGN5rMzP5XfATE_7Yg |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secure+Multiterminal+Source+Coding+With+Side+Information+at+the+Eavesdropper&rft.jtitle=IEEE+transactions+on+information+theory&rft.au=Villard%2C+J&rft.au=Piantanida%2C+P&rft.date=2013-06-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=0018-9448&rft.eissn=1557-9654&rft.volume=59&rft.issue=6&rft.spage=3668&rft_id=info:doi/10.1109%2FTIT.2013.2245394&rft.externalDBID=NO_FULL_TEXT&rft.externalDocID=2980469911 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0018-9448&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0018-9448&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0018-9448&client=summon |