{"id":"https://openalex.org/W2588417521","doi":"https://doi.org/10.1109/icitst.2016.7856681","title":"Compressive Sensing encryption modes and their security","display_name":"Compressive Sensing encryption modes and their security","publication_year":2016,"publication_date":"2016-12-01","ids":{"openalex":"https://openalex.org/W2588417521","doi":"https://doi.org/10.1109/icitst.2016.7856681","mag":"2588417521"},"language":"en","primary_location":{"id":"doi:10.1109/icitst.2016.7856681","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitst.2016.7856681","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077905061","display_name":"R. Fay","orcid":null},"institutions":[{"id":"https://openalex.org/I206895457","display_name":"University of Siegen","ror":"https://ror.org/02azyry73","country_code":"DE","type":"education","lineage":["https://openalex.org/I206895457"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Robin Fay","raw_affiliation_strings":["Chair of Data Communications Systems, University of Siegen, Siegen, Germany"],"affiliations":[{"raw_affiliation_string":"Chair of Data Communications Systems, University of Siegen, Siegen, Germany","institution_ids":["https://openalex.org/I206895457"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021417034","display_name":"Christoph Ruland","orcid":"https://orcid.org/0000-0002-4518-8735"},"institutions":[{"id":"https://openalex.org/I206895457","display_name":"University of Siegen","ror":"https://ror.org/02azyry73","country_code":"DE","type":"education","lineage":["https://openalex.org/I206895457"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Christoph Ruland","raw_affiliation_strings":["Chair of Data Communications Systems, University of Siegen, Siegen, Germany"],"affiliations":[{"raw_affiliation_string":"Chair of Data Communications Systems, University of Siegen, Siegen, Germany","institution_ids":["https://openalex.org/I206895457"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5077905061"],"corresponding_institution_ids":["https://openalex.org/I206895457"],"apc_list":null,"apc_paid":null,"fwci":6.5528,"has_fulltext":false,"cited_by_count":30,"citation_normalized_percentile":{"value":0.97139842,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":"7","issue":null,"first_page":"119","last_page":"126"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10500","display_name":"Sparse and Compressive Sensing Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2206","display_name":"Computational Mechanics"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10500","display_name":"Sparse and Compressive Sensing Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2206","display_name":"Computational Mechanics"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11739","display_name":"Microwave Imaging and Scattering Analysis","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11447","display_name":"Blind Source Separation Techniques","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8863083124160767},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7517314553260803},{"id":"https://openalex.org/keywords/multiple-encryption","display_name":"Multiple encryption","score":0.6121593117713928},{"id":"https://openalex.org/keywords/compressed-sensing","display_name":"Compressed sensing","score":0.5947616100311279},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.5684583783149719},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.5609618425369263},{"id":"https://openalex.org/keywords/40-bit-encryption","display_name":"40-bit encryption","score":0.5247833132743835},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.4838651418685913},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.47344183921813965},{"id":"https://openalex.org/keywords/filesystem-level-encryption","display_name":"Filesystem-level encryption","score":0.45596450567245483},{"id":"https://openalex.org/keywords/link-encryption","display_name":"Link encryption","score":0.4167737066745758},{"id":"https://openalex.org/keywords/56-bit-encryption","display_name":"56-bit encryption","score":0.4107475280761719},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2927151322364807},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.1808691918849945}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8863083124160767},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7517314553260803},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.6121593117713928},{"id":"https://openalex.org/C124851039","wikidata":"https://www.wikidata.org/wiki/Q2665459","display_name":"Compressed sensing","level":2,"score":0.5947616100311279},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.5684583783149719},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.5609618425369263},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.5247833132743835},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.4838651418685913},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.47344183921813965},{"id":"https://openalex.org/C18319499","wikidata":"https://www.wikidata.org/wiki/Q5448402","display_name":"Filesystem-level encryption","level":4,"score":0.45596450567245483},{"id":"https://openalex.org/C69254412","wikidata":"https://www.wikidata.org/wiki/Q6554302","display_name":"Link encryption","level":4,"score":0.4167737066745758},{"id":"https://openalex.org/C46905813","wikidata":"https://www.wikidata.org/wiki/Q4640678","display_name":"56-bit encryption","level":4,"score":0.4107475280761719},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2927151322364807},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.1808691918849945}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/icitst.2016.7856681","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitst.2016.7856681","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","raw_type":"proceedings-article"},{"id":"mag:2752845977","is_oa":false,"landing_page_url":"http://jglobal.jst.go.jp/en/public/20090422/201702277323111768","pdf_url":null,"source":{"id":"https://openalex.org/S4306512817","display_name":"IEEE Conference Proceedings","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":"IEEE Conference Proceedings","raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320320879","display_name":"Deutsche Forschungsgemeinschaft","ror":"https://ror.org/018mejw64"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W50116563","https://openalex.org/W1975711734","https://openalex.org/W2014778838","https://openalex.org/W2015418199","https://openalex.org/W2043944888","https://openalex.org/W2064984609","https://openalex.org/W2090432413","https://openalex.org/W2106847401","https://openalex.org/W2109450547","https://openalex.org/W2121657064","https://openalex.org/W2129131372","https://openalex.org/W2129638195","https://openalex.org/W2134615993","https://openalex.org/W2139172211","https://openalex.org/W2145096794","https://openalex.org/W2160732418","https://openalex.org/W2177125333","https://openalex.org/W2190983062","https://openalex.org/W2296616510","https://openalex.org/W2534039953","https://openalex.org/W2790592307","https://openalex.org/W2949914080","https://openalex.org/W3142950903","https://openalex.org/W3212896302","https://openalex.org/W4250955649","https://openalex.org/W4285719527","https://openalex.org/W6763588290"],"related_works":["https://openalex.org/W4315815885","https://openalex.org/W2188413349","https://openalex.org/W2183295123","https://openalex.org/W4205100462","https://openalex.org/W2370942914","https://openalex.org/W2545514196","https://openalex.org/W2915067502","https://openalex.org/W3004922236","https://openalex.org/W3118757263","https://openalex.org/W4309584611"],"abstract_inverted_index":{"Compressed":[0],"Sensing":[1,33,87,162,200],"may":[2,104],"offer":[3],"confidentiality":[4,112],"with":[5,146,168],"a":[6,66,108,206,214],"good":[7],"level":[8],"of":[9,31,84,98,113,124,135,184,193,209],"security":[10],"that":[11,101,179,220],"comes":[12],"at":[13,222],"limited":[14],"extra":[15],"costs.":[16],"By":[17],"this":[18,73,96,139],"means,":[19],"encryption":[20,34,52,99,163,201,217],"can":[21,58],"be":[22,60,105],"added":[23],"right":[24],"into":[25],"the":[26,39,43,47,51,78,82,114,121,125,133,151,185,191,223],"sampling":[27],"process.":[28],"Previous":[29],"proposals":[30],"Compressive":[32,86,161,199],"schemes":[35],"are":[36,141,203],"based":[37],"on":[38,77,81],"randomness":[40],"introduced":[41],"by":[42,120,212],"sensing":[44],"matrix.":[45],"Once":[46],"matrix":[48],"is":[49,75,116,165,180,188],"fixed,":[50],"becomes":[53],"deterministic":[54],"and":[55,89,176,195,218],"therefore":[56],"it":[57,90],"hardly":[59],"secure":[61],"when":[62],"encrypting":[63],"more":[64],"than":[65],"single":[67,109],"signal.":[68],"The":[69,111,182],"work":[70],"presented":[71,166],"in":[72,138,205],"paper":[74,140],"built":[76],"theoretical":[79],"results":[80],"secrecy":[83,123,183,192],"one-time":[85],"encryption,":[88],"proposes":[91],"practical":[92,210],"realizations,":[93],"which":[94],"extend":[95],"kind":[97],"so":[100],"multiple":[102],"signals":[103,145,152],"encrypted":[106],"under":[107],"key.":[110],"signal":[115],"thereby":[117],"solely":[118],"given":[119],"inherent":[122],"compressed":[126],"measurements.":[127],"In":[128],"contrast":[129],"to":[130,143,154,190],"recent":[131],"suggestions,":[132],"modes":[134,164,187,202],"operation":[136],"defined":[137],"able":[142],"encrypt":[144],"different":[147],"energy":[148,153],"without":[149],"exposing":[150],"an":[155],"eavesdropper.":[156],"A":[157],"general":[158],"design":[159],"for":[160,173],"along":[167],"two":[169],"realizations:":[170],"one":[171,178],"designed":[172],"parallel":[174],"processing":[175],"another":[177],"self-synchronizing.":[181],"proposed":[186],"reduced":[189],"known":[194],"trusted":[196],"cryptographic":[197],"primitives.":[198],"useful":[204],"wide":[207],"range":[208],"applications":[211],"providing":[213],"joint":[215],"end-to-end":[216],"compression":[219],"starts":[221],"sensor":[224],"level.":[225]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":13},{"year":2017,"cited_by_count":5}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
