{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T16:48:34Z","timestamp":1725727714212},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,10]]},"DOI":"10.1109\/itw.2011.6089582","type":"proceedings-article","created":{"date-parts":[[2011,12,6]],"date-time":"2011-12-06T20:58:48Z","timestamp":1323205128000},"page":"673-677","source":"Crossref","is-referenced-by-count":2,"title":["Percolation in the secrecy graph: Bounds on the critical probability and impact of power constraints"],"prefix":"10.1109","author":[{"given":"Amites","family":"Sarkar","sequence":"first","affiliation":[]},{"given":"Martin","family":"Haenggi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1214\/aoap\/1034968142"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCS.2008.4737329"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISITA.2010.5649155"},{"journal-title":"posted on the arXiv","article-title":"Percolation and connectivity in the intrinsically secure communications graph","year":"2010","author":"pinto","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ITA.2011.5743576"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1137\/0109045"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139167383"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1098-2418(199610)9:3<295::AID-RSA3>3.0.CO;2-S"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2008.4595044"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1214\/aoap\/1177004978"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1017\/S0305004100034241"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/rsa.20064"},{"journal-title":"Percolation in the K-nearest Neighbor Graph","year":"0","author":"balister","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511895357"}],"event":{"name":"2011 IEEE Information Theory Workshop (ITW)","start":{"date-parts":[[2011,10,16]]},"location":"Paraty, Brazil","end":{"date-parts":[[2011,10,20]]}},"container-title":["2011 IEEE Information Theory Workshop"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6081149\/6089351\/06089582.pdf?arnumber=6089582","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T14:05:02Z","timestamp":1490105102000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6089582\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/itw.2011.6089582","relation":{},"subject":[],"published":{"date-parts":[[2011,10]]}}}