{"id":"https://openalex.org/W1981848655","doi":"https://doi.org/10.1109/isit.2012.6283955","title":"Capacity region of non-degraded wiretap channel with noiseless feedback","display_name":"Capacity region of non-degraded wiretap channel with noiseless feedback","publication_year":2012,"publication_date":"2012-07-01","ids":{"openalex":"https://openalex.org/W1981848655","doi":"https://doi.org/10.1109/isit.2012.6283955","mag":"1981848655"},"language":"en","primary_location":{"id":"doi:10.1109/isit.2012.6283955","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2012.6283955","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Symposium on Information Theory Proceedings","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103072230","display_name":"Bin Dai","orcid":"https://orcid.org/0000-0003-3507-1901"},"institutions":[{"id":"https://openalex.org/I62318514","display_name":"University of Duisburg-Essen","ror":"https://ror.org/04mz5ra38","country_code":"DE","type":"education","lineage":["https://openalex.org/I62318514"]},{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN","DE"],"is_corresponding":true,"raw_author_name":"Bin Dai","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai, China","Institute for Experimental Mathematics, Duisburg Essen University, Essen, Germany"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"Institute for Experimental Mathematics, Duisburg Essen University, Essen, Germany","institution_ids":["https://openalex.org/I62318514"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065607012","display_name":"A. J. Han Vinck","orcid":"https://orcid.org/0000-0002-7756-5304"},"institutions":[{"id":"https://openalex.org/I62318514","display_name":"University of Duisburg-Essen","ror":"https://ror.org/04mz5ra38","country_code":"DE","type":"education","lineage":["https://openalex.org/I62318514"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"A. J. Han Vinck","raw_affiliation_strings":["Institute for Experimental Mathematics, Duisburg Essen University, Essen, Germany"],"affiliations":[{"raw_affiliation_string":"Institute for Experimental Mathematics, Duisburg Essen University, Essen, Germany","institution_ids":["https://openalex.org/I62318514"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101495751","display_name":"Yuan Luo","orcid":"https://orcid.org/0000-0002-5741-0567"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuan Luo","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai, China","National Mobile Communications Research Laboratory, South East University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"National Mobile Communications Research Laboratory, South East University, Nanjing, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015055734","display_name":"Zhuojun Zhuang","orcid":"https://orcid.org/0000-0001-5632-2787"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhuojun Zhuang","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5103072230"],"corresponding_institution_ids":["https://openalex.org/I183067930","https://openalex.org/I62318514"],"apc_list":null,"apc_paid":null,"fwci":2.455,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.89316521,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"244","last_page":"248"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.9067369699478149},{"id":"https://openalex.org/keywords/equivocation","display_name":"Equivocation","score":0.8906363248825073},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.6324892044067383},{"id":"https://openalex.org/keywords/channel-capacity","display_name":"Channel capacity","score":0.5884796977043152},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5628195405006409},{"id":"https://openalex.org/keywords/secure-transmission","display_name":"Secure transmission","score":0.5225355625152588},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.4909529983997345},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.4516935348510742},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.40337175130844116},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.3773519992828369},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.3037455379962921},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2594295144081116},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.25082069635391235},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.10858002305030823}],"concepts":[{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.9067369699478149},{"id":"https://openalex.org/C17859611","wikidata":"https://www.wikidata.org/wiki/Q10797615","display_name":"Equivocation","level":2,"score":0.8906363248825073},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.6324892044067383},{"id":"https://openalex.org/C97744766","wikidata":"https://www.wikidata.org/wiki/Q870845","display_name":"Channel capacity","level":3,"score":0.5884796977043152},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5628195405006409},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.5225355625152588},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.4909529983997345},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.4516935348510742},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.40337175130844116},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.3773519992828369},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.3037455379962921},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2594295144081116},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.25082069635391235},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.10858002305030823},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit.2012.6283955","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2012.6283955","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Symposium on Information Theory Proceedings","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1978070031","https://openalex.org/W2043769961","https://openalex.org/W2049651362","https://openalex.org/W2123658733","https://openalex.org/W2128153585","https://openalex.org/W2144007657","https://openalex.org/W2145518237","https://openalex.org/W2168585224","https://openalex.org/W2177444406","https://openalex.org/W4248561416","https://openalex.org/W6829860643"],"related_works":["https://openalex.org/W2949679674","https://openalex.org/W4235702756","https://openalex.org/W2951762147","https://openalex.org/W2743400891","https://openalex.org/W2167949116","https://openalex.org/W3005577593","https://openalex.org/W1981848655","https://openalex.org/W2556230227","https://openalex.org/W3088151720","https://openalex.org/W1999092495"],"abstract_inverted_index":{"The":[0],"non-degraded":[1,49],"wiretap":[2,50],"channel":[3,51],"with":[4,52,70],"noiseless":[5,53],"feedback":[6],"is":[7,45,62],"first":[8],"investigated":[9],"by":[10],"R.":[11],"Ahlswede":[12],"and":[13,18],"N.":[14],"Cai,":[15],"where":[16],"lower":[17],"upper":[19],"bounds":[20],"on":[21],"the":[22,31,42,48,56,66],"secrecy":[23,57],"capacity":[24,58],"are":[25],"provided":[26],"in":[27],"their":[28],"work.":[29],"However,":[30],"capacity-equivocation":[32,43],"region":[33,44],"has":[34],"not":[35],"been":[36],"determined":[37,46],"yet.":[38],"In":[39],"this":[40,60],"paper,":[41],"for":[47],"feedback.":[54],"Furthermore,":[55],"of":[59],"model":[61],"formulated,":[63],"which":[64],"provides":[65],"best":[67],"transmission":[68],"rate":[69],"perfect":[71],"secrecy.":[72]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":6},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
