{"id":"https://openalex.org/W3048747588","doi":"https://doi.org/10.1109/infocomwkshps50562.2020.9162910","title":"Fountain-Coding-Aided Secure Delivery via Cross-locking Between Payload Data and Control Information","display_name":"Fountain-Coding-Aided Secure Delivery via Cross-locking Between Payload Data and Control Information","publication_year":2020,"publication_date":"2020-07-01","ids":{"openalex":"https://openalex.org/W3048747588","doi":"https://doi.org/10.1109/infocomwkshps50562.2020.9162910","mag":"3048747588"},"language":"en","primary_location":{"id":"doi:10.1109/infocomwkshps50562.2020.9162910","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocomwkshps50562.2020.9162910","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001763869","display_name":"Hanxun Ren","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Hanxun Ren","raw_affiliation_strings":["National Simulation Education Center for Communications and Information Systems"],"affiliations":[{"raw_affiliation_string":"National Simulation Education Center for Communications and Information Systems","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054096196","display_name":"Qinghe Du","orcid":"https://orcid.org/0000-0002-4992-9166"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Qinghe Du","raw_affiliation_strings":["National Simulation Education Center for Communications and Information Systems"],"affiliations":[{"raw_affiliation_string":"National Simulation Education Center for Communications and Information Systems","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036228638","display_name":"Yijie Ou","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yijie Ou","raw_affiliation_strings":["National Simulation Education Center for Communications and Information Systems"],"affiliations":[{"raw_affiliation_string":"National Simulation Education Center for Communications and Information Systems","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060549116","display_name":"Pinyi Ren","orcid":"https://orcid.org/0000-0002-0147-3673"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Pinyi Ren","raw_affiliation_strings":["National Simulation Education Center for Communications and Information Systems"],"affiliations":[{"raw_affiliation_string":"National Simulation Education Center for Communications and Information Systems","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5001763869"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.5137,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.64717003,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"14","issue":null,"first_page":"538","last_page":"543"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fountain-code","display_name":"Fountain code","score":0.8107590079307556},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8089495897293091},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.7063382267951965},{"id":"https://openalex.org/keywords/codebook","display_name":"Codebook","score":0.6330177783966064},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6214693188667297},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.5780565142631531},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.5094090104103088},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.4862593412399292},{"id":"https://openalex.org/keywords/secure-transmission","display_name":"Secure transmission","score":0.4284003674983978},{"id":"https://openalex.org/keywords/data-transmission","display_name":"Data transmission","score":0.4243374466896057},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.4199202060699463},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4016220271587372},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2924997806549072},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.1551741063594818},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1415039598941803}],"concepts":[{"id":"https://openalex.org/C76132124","wikidata":"https://www.wikidata.org/wiki/Q5474786","display_name":"Fountain code","level":5,"score":0.8107590079307556},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8089495897293091},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.7063382267951965},{"id":"https://openalex.org/C127759330","wikidata":"https://www.wikidata.org/wiki/Q637416","display_name":"Codebook","level":2,"score":0.6330177783966064},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6214693188667297},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.5780565142631531},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.5094090104103088},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.4862593412399292},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.4284003674983978},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.4243374466896057},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.4199202060699463},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4016220271587372},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2924997806549072},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.1551741063594818},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1415039598941803},{"id":"https://openalex.org/C78944582","wikidata":"https://www.wikidata.org/wiki/Q5158264","display_name":"Concatenated error correction code","level":4,"score":0.0},{"id":"https://openalex.org/C157125643","wikidata":"https://www.wikidata.org/wiki/Q884707","display_name":"Block code","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infocomwkshps50562.2020.9162910","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocomwkshps50562.2020.9162910","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7699999809265137}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1987183128","https://openalex.org/W2119666300","https://openalex.org/W2127856956","https://openalex.org/W2144007657","https://openalex.org/W2151222548","https://openalex.org/W2782623373","https://openalex.org/W2785942601","https://openalex.org/W2793482173","https://openalex.org/W2904532839","https://openalex.org/W4211138267","https://openalex.org/W6677794800"],"related_works":["https://openalex.org/W2293149949","https://openalex.org/W2026099691","https://openalex.org/W4284672201","https://openalex.org/W2377486419","https://openalex.org/W2943202426","https://openalex.org/W2950156284","https://openalex.org/W2394311792","https://openalex.org/W2552720671","https://openalex.org/W2810421629","https://openalex.org/W2355072848"],"abstract_inverted_index":{"The":[0,172],"conventional":[1],"fountain-coding":[2],"aided":[3],"strategies":[4],"realize":[5],"transmission":[6,79,143,149],"secrecy":[7],"by":[8,48],"ensuring":[9],"the":[10,15,23,29,36,57,71,84,88,93,107,115,125,129,141,153,159,177,181,185,188,192],"legitimate":[11,103,120],"user":[12,121],"to":[13,123,132],"receive":[14],"sufficient":[16],"number":[17],"of":[18,22,31,38,42,50,53,96,187],"fountain-coded":[19,85,118],"packets":[20,55,119],"ahead":[21],"eavesdropper":[24,134],"does,":[25],"which":[26,59,92],"emphasise":[27],"on":[28,152,158],"security":[30,67,165],"entire":[32],"file.":[33],"However,":[34],"in":[35,91,169,184],"process":[37],"communication":[39],"a":[40,77],"fraction":[41],"confidential":[43],"message":[44],"will":[45],"be":[46,112],"recovered":[47],"parts":[49],"correct":[51],"decoding":[52,136],"intercepted":[54],"at":[56],"eavesdropper,":[58],"is":[60,99,144,156,167],"forbidden":[61],"for":[62,195],"some":[63],"scenarios":[64],"with":[65,128],"stringent":[66],"requirement.":[68],"To":[69],"solve":[70],"above":[72],"mentioned":[73],"issue,":[74],"we":[75],"propose":[76],"secure":[78,142,148],"scheme":[80,155,179],"via":[81],"cross-locking":[82],"between":[83,102],"data":[86],"and":[87,163,191],"codebook":[89,109],"information,":[90],"generating":[94,130],"matrix":[95,131],"fountain":[97],"codes":[98],"implicitly":[100],"transferred":[101],"pairs":[104],"such":[105],"that":[106,176],"inter-data":[108],"information":[110],"can":[111],"protected.":[113],"Specifically,":[114],"transmitter":[116],"exploits":[117],"received":[122],"encrypt":[124],"key":[126],"associated":[127],"prevent":[133],"from":[135],"any":[137],"coded":[138],"packets,":[139],"thereby":[140],"guaranteed.":[145],"A":[146],"wireless":[147],"system":[150],"based":[151],"proposed":[154,178],"developed":[157],"software":[160],"radio":[161],"platform":[162],"its":[164],"performance":[166],"evaluated":[168],"actual":[170],"scenarios.":[171],"experimental":[173],"results":[174],"prove":[175],"outperforms":[180],"comparison":[182],"schemes":[183],"matter":[186],"intercept":[189],"probability":[190],"recovering":[193],"proportion":[194],"eavesdropper.":[196]},"counts_by_year":[{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
