{"id":"https://openalex.org/W2610514896","doi":"https://doi.org/10.1109/globalsip.2016.7905982","title":"On deterministic IC with common and private message under security constraints","display_name":"On deterministic IC with common and private message under security constraints","publication_year":2016,"publication_date":"2016-12-01","ids":{"openalex":"https://openalex.org/W2610514896","doi":"https://doi.org/10.1109/globalsip.2016.7905982","mag":"2610514896"},"language":"en","primary_location":{"id":"doi:10.1109/globalsip.2016.7905982","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globalsip.2016.7905982","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE Global Conference on Signal and Information Processing (GlobalSIP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5031026850","display_name":"Hendrik Vogt","orcid":"https://orcid.org/0000-0002-4537-2938"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Hendrik Vogt","raw_affiliation_strings":["Ruhr-Universit\u00e4t Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Ruhr-Universit\u00e4t Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037458436","display_name":"Zohaib Hassan Awan","orcid":"https://orcid.org/0000-0003-3357-6455"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Zohaib Hassan Awan","raw_affiliation_strings":["Ruhr-Universit\u00e4t Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Ruhr-Universit\u00e4t Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034269994","display_name":"Aydin Sezgin","orcid":"https://orcid.org/0000-0003-3511-2662"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Aydin Sezgin","raw_affiliation_strings":["Ruhr-Universit\u00e4t Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Ruhr-Universit\u00e4t Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5031026850"],"corresponding_institution_ids":["https://openalex.org/I904495901"],"apc_list":null,"apc_paid":null,"fwci":0.3675,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.68505946,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"62","issue":null,"first_page":"947","last_page":"952"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9793999791145325,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.8680297136306763},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.7363578081130981},{"id":"https://openalex.org/keywords/interference","display_name":"Interference (communication)","score":0.6836057305335999},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6362061500549316},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.6221621036529541},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6140647530555725},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.528617799282074},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.4948078989982605},{"id":"https://openalex.org/keywords/information-theoretic-security","display_name":"Information-theoretic security","score":0.42514997720718384},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.36642104387283325},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.32158857583999634},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.14538100361824036},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.14038541913032532},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.11080613732337952}],"concepts":[{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.8680297136306763},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.7363578081130981},{"id":"https://openalex.org/C32022120","wikidata":"https://www.wikidata.org/wiki/Q797225","display_name":"Interference (communication)","level":3,"score":0.6836057305335999},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6362061500549316},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.6221621036529541},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6140647530555725},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.528617799282074},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.4948078989982605},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.42514997720718384},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.36642104387283325},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.32158857583999634},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.14538100361824036},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.14038541913032532},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.11080613732337952},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/globalsip.2016.7905982","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globalsip.2016.7905982","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE Global Conference on Signal and Information Processing (GlobalSIP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7400000095367432,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1498883075","https://openalex.org/W1626922264","https://openalex.org/W2043769961","https://openalex.org/W2144007657","https://openalex.org/W2210387432","https://openalex.org/W2332150434","https://openalex.org/W2610514896","https://openalex.org/W2963847364","https://openalex.org/W3196457178","https://openalex.org/W4294149753","https://openalex.org/W4302935629","https://openalex.org/W6737278409"],"related_works":["https://openalex.org/W2150528942","https://openalex.org/W2114007974","https://openalex.org/W2022046490","https://openalex.org/W2154832352","https://openalex.org/W1483037127","https://openalex.org/W2898567960","https://openalex.org/W4387963661","https://openalex.org/W2340481533","https://openalex.org/W2036210457","https://openalex.org/W2369043755"],"abstract_inverted_index":{"We":[0,52],"study":[1],"a":[2,24,37],"two-user":[3],"symmetric":[4],"interference":[5],"channel":[6],"(IC)":[7],"with":[8],"common":[9,25],"and":[10,43,87,91],"private":[11,38],"message":[12,26,39],"under":[13],"security":[14],"constraints.":[15],"In":[16],"this":[17,77],"model,":[18],"one":[19,41],"transmitter":[20,33],"wants":[21,34],"to":[22,27,35,40,45],"send":[23,36],"both":[28],"receivers,":[29],"while":[30],"the":[31,49,59,64,94],"other":[32],"receiver":[42],"needs":[44],"be":[46],"protected":[47],"from":[48],"unintended":[50],"receiver.":[51],"first":[53],"establish":[54],"an":[55,73],"inner":[56,86],"bound":[57,75],"on":[58,76],"secrecy":[60,95],"rate":[61],"region":[62],"for":[63],"case":[65],"of":[66],"weak":[67],"interference.":[68],"Furthermore,":[69],"we":[70,83],"also":[71],"develop":[72],"outer":[74,88],"model.":[78],"For":[79],"few":[80],"special":[81],"regimes,":[82],"show":[84],"that":[85],"bounds":[89],"coincide":[90],"thus":[92],"characterizing":[93],"capacity":[96],"region.":[97]},"counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
