{"id":"https://openalex.org/W2024883514","doi":"https://doi.org/10.1109/icc.2014.6883651","title":"Resource allocation for secret transmissions on parallel Rayleigh channels","display_name":"Resource allocation for secret transmissions on parallel Rayleigh channels","publication_year":2014,"publication_date":"2014-06-01","ids":{"openalex":"https://openalex.org/W2024883514","doi":"https://doi.org/10.1109/icc.2014.6883651","mag":"2024883514"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2014.6883651","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2014.6883651","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052660139","display_name":"Nicola Laurenti","orcid":"https://orcid.org/0000-0001-7592-1929"},"institutions":[{"id":"https://openalex.org/I138689650","display_name":"University of Padua","ror":"https://ror.org/00240q980","country_code":"IT","type":"education","lineage":["https://openalex.org/I138689650"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"N. Laurenti","raw_affiliation_strings":["Department of Information Engineering, University of Padova, Padova, Italy","Department of Information Engineering, University of Padova , Padua, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Information Engineering, University of Padova, Padova, Italy","institution_ids":["https://openalex.org/I138689650"]},{"raw_affiliation_string":"Department of Information Engineering, University of Padova , Padua, Italy","institution_ids":["https://openalex.org/I138689650"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076790432","display_name":"Stefano Tomasin","orcid":"https://orcid.org/0000-0003-3253-6793"},"institutions":[{"id":"https://openalex.org/I138689650","display_name":"University of Padua","ror":"https://ror.org/00240q980","country_code":"IT","type":"education","lineage":["https://openalex.org/I138689650"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"S. Tomasin","raw_affiliation_strings":["Department of Information Engineering, University of Padova, Padova, Italy","Department of Information Engineering, University of Padova , Padua, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Information Engineering, University of Padova, Padova, Italy","institution_ids":["https://openalex.org/I138689650"]},{"raw_affiliation_string":"Department of Information Engineering, University of Padova , Padua, Italy","institution_ids":["https://openalex.org/I138689650"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057294055","display_name":"Francesco Renna","orcid":null},"institutions":[{"id":"https://openalex.org/I4210120471","display_name":"Instituto de Telecomunica\u00e7\u00f5es","ror":"https://ror.org/02ht4fk33","country_code":"PT","type":"nonprofit","lineage":["https://openalex.org/I4210120471"]},{"id":"https://openalex.org/I182534213","display_name":"Universidade do Porto","ror":"https://ror.org/043pwc612","country_code":"PT","type":"education","lineage":["https://openalex.org/I182534213"]}],"countries":["PT"],"is_corresponding":false,"raw_author_name":"F. Renna","raw_affiliation_strings":["Instituto de Telecomunica\u00e7\u00f5es e Departamento de Ci\u00eancia de Computadores, Faculdade de Ci\u00eancias da Universidade do Porto, Porto, Portugal","Dept. de Cienc. de Comput., Univ. do Porto, Porto, Portugal"],"affiliations":[{"raw_affiliation_string":"Instituto de Telecomunica\u00e7\u00f5es e Departamento de Ci\u00eancia de Computadores, Faculdade de Ci\u00eancias da Universidade do Porto, Porto, Portugal","institution_ids":["https://openalex.org/I4210120471"]},{"raw_affiliation_string":"Dept. de Cienc. de Comput., Univ. do Porto, Porto, Portugal","institution_ids":["https://openalex.org/I182534213"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5052660139"],"corresponding_institution_ids":["https://openalex.org/I138689650"],"apc_list":null,"apc_paid":null,"fwci":1.0467,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.79907247,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"2209","last_page":"2214"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6868139505386353},{"id":"https://openalex.org/keywords/additive-white-gaussian-noise","display_name":"Additive white Gaussian noise","score":0.6670805215835571},{"id":"https://openalex.org/keywords/alice-and-bob","display_name":"Alice and Bob","score":0.6114549040794373},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.597130298614502},{"id":"https://openalex.org/keywords/rayleigh-fading","display_name":"Rayleigh fading","score":0.5658254623413086},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.5000143051147461},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.4680478274822235},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.4108703136444092},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3685033321380615},{"id":"https://openalex.org/keywords/fading","display_name":"Fading","score":0.34526997804641724},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.32704633474349976},{"id":"https://openalex.org/keywords/alice","display_name":"Alice (programming language)","score":0.28096631169319153},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.26164698600769043},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.08770549297332764}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6868139505386353},{"id":"https://openalex.org/C169334058","wikidata":"https://www.wikidata.org/wiki/Q353292","display_name":"Additive white Gaussian noise","level":3,"score":0.6670805215835571},{"id":"https://openalex.org/C127964579","wikidata":"https://www.wikidata.org/wiki/Q649676","display_name":"Alice and Bob","level":3,"score":0.6114549040794373},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.597130298614502},{"id":"https://openalex.org/C56985126","wikidata":"https://www.wikidata.org/wiki/Q854039","display_name":"Rayleigh fading","level":4,"score":0.5658254623413086},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.5000143051147461},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.4680478274822235},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.4108703136444092},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3685033321380615},{"id":"https://openalex.org/C81978471","wikidata":"https://www.wikidata.org/wiki/Q1196572","display_name":"Fading","level":3,"score":0.34526997804641724},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.32704633474349976},{"id":"https://openalex.org/C2778222013","wikidata":"https://www.wikidata.org/wiki/Q1136926","display_name":"Alice (programming language)","level":2,"score":0.28096631169319153},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.26164698600769043},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.08770549297332764},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/icc.2014.6883651","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2014.6883651","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},{"id":"pmh:oai:www.research.unipd.it:11577/2975901","is_oa":false,"landing_page_url":"http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6883651","pdf_url":null,"source":{"id":"https://openalex.org/S4377196283","display_name":"Research Padua  Archive (University of Padua)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I138689650","host_organization_name":"University of Padua","host_organization_lineage":["https://openalex.org/I138689650"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1984355813","https://openalex.org/W1988653434","https://openalex.org/W2013605702","https://openalex.org/W2080693943","https://openalex.org/W2113706820","https://openalex.org/W2117154174","https://openalex.org/W2149777831","https://openalex.org/W2159488583","https://openalex.org/W2159687282","https://openalex.org/W2172233962","https://openalex.org/W6682104819"],"related_works":["https://openalex.org/W2116044594","https://openalex.org/W2101999641","https://openalex.org/W1503152075","https://openalex.org/W301676527","https://openalex.org/W2052600062","https://openalex.org/W2124541664","https://openalex.org/W289296924","https://openalex.org/W2122920812","https://openalex.org/W2942696422","https://openalex.org/W2076148615"],"abstract_inverted_index":{"A":[0],"transmission":[1],"between":[2],"two":[3,72],"agents,":[4],"Alice":[5,43],"and":[6,34,37,66,89,113,134,154],"Bob,":[7,63],"over":[8,168],"a":[9,17,22,85,106,116,124,178],"set":[10,24],"of":[11,25,48,57,108,150,165],"parallel":[12,26],"sub-channels":[13,141,167],"is":[14,82,102,171],"overheard":[15],"by":[16],"third":[18],"agent":[19],"Eve,":[20],"through":[21],"second":[23],"sub-channels.":[27,94],"All":[28],"subchannels":[29],"are":[30,74,132,142],"flat":[31],"with":[32,54,84,181],"random":[33],"independent":[35],"gains":[36],"additive":[38],"white":[39],"Gaussian":[40],"noise":[41],"(AWGN).":[42],"splits":[44],"the":[45,52,55,59,79,93,96,99,127,148,163,184],"total":[46],"amount":[47],"available":[49],"power":[50,170],"among":[51,92],"sub-channels,":[53],"purpose":[56],"maximizing":[58],"communication":[60],"rate":[61],"to":[62,146,177,183],"under":[64,123],"reliability":[65],"secrecy":[67,121,128],"constraints.":[68],"To":[69],"this":[70],"end,":[71],"schemes":[73],"considered.":[75],"In":[76,95,144],"one":[77],"case":[78,98],"secret":[80,100],"message":[81,101],"encoded":[83,112],"single":[86],"wiretap":[87],"code":[88],"then":[90],"split":[91,104,172],"latter":[97],"first":[103],"into":[105],"number":[107],"sub-messages,":[109],"each":[110],"separately":[111],"transmitted":[114],"on":[115,126,162],"different":[117],"sub-channel.":[118],"The":[119],"achievable":[120],"rates":[122],"constraint":[125],"outage":[129],"probability":[130],"(SOP)":[131],"derived":[133],"closed":[135],"form":[136],"expressions":[137],"for":[138],"Rayleigh":[139],"fading":[140],"obtained.":[143],"order":[145],"limit":[147],"complexity":[149],"resources":[151],"optimization":[152],"(power":[153],"rates)":[155],"we":[156],"also":[157],"consider":[158],"suboptimal":[159],"solutions":[160],"based":[161],"selection":[164],"active":[166],"which":[169],"either":[173],"equally":[174],"or":[175],"according":[176],"waterfilling":[179],"algorithm":[180],"respect":[182],"Alice-Bob":[185],"channel.":[186]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
