{"id":"https://openalex.org/W2055601566","doi":"https://doi.org/10.1109/isit.2014.6874788","title":"On the achievable individual-secrecy rate region for broadcast channels with receiver side information","display_name":"On the achievable individual-secrecy rate region for broadcast channels with receiver side information","publication_year":2014,"publication_date":"2014-06-01","ids":{"openalex":"https://openalex.org/W2055601566","doi":"https://doi.org/10.1109/isit.2014.6874788","mag":"2055601566"},"language":"en","primary_location":{"id":"doi:10.1109/isit.2014.6874788","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2014.6874788","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE International Symposium on Information Theory","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100629230","display_name":"Yanling Chen","orcid":"https://orcid.org/0000-0003-1603-9121"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Yanling Chen","raw_affiliation_strings":["Communication Systems, Ruhr University Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Communication Systems, Ruhr University Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001012632","display_name":"O. Ozan Koyluoglu","orcid":"https://orcid.org/0000-0001-8512-4755"},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"O. Ozan Koyluoglu","raw_affiliation_strings":["Department of Electrical and Computer Engineering, The University of Arizona, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, The University of Arizona, USA","institution_ids":["https://openalex.org/I138006243"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034269994","display_name":"Aydin Sezgin","orcid":"https://orcid.org/0000-0003-3511-2662"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Aydin Sezgin","raw_affiliation_strings":["Communication Systems, Ruhr University Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Communication Systems, Ruhr University Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100629230"],"corresponding_institution_ids":["https://openalex.org/I904495901"],"apc_list":null,"apc_paid":null,"fwci":1.4653,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.84514219,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"26","last_page":"30"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.9145001173019409},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6687581539154053},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5647765398025513},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.5507873892784119},{"id":"https://openalex.org/keywords/secure-transmission","display_name":"Secure transmission","score":0.5231536626815796},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.5115538239479065},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.46649572253227234},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.4544851779937744},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.41815897822380066},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.4143940210342407},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37480413913726807},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.3376401960849762},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.25885167717933655},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.20302388072013855},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.16465649008750916},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.06423422694206238}],"concepts":[{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.9145001173019409},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6687581539154053},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5647765398025513},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.5507873892784119},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.5231536626815796},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.5115538239479065},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.46649572253227234},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.4544851779937744},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.41815897822380066},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.4143940210342407},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37480413913726807},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.3376401960849762},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.25885167717933655},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.20302388072013855},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.16465649008750916},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.06423422694206238},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit.2014.6874788","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2014.6874788","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE International Symposium on Information Theory","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6000000238418579,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W1494099594","https://openalex.org/W1964279069","https://openalex.org/W2131688910","https://openalex.org/W2144007657","https://openalex.org/W2542322279"],"related_works":["https://openalex.org/W4386057510","https://openalex.org/W2583477080","https://openalex.org/W2978077458","https://openalex.org/W2766178630","https://openalex.org/W2782635967","https://openalex.org/W2886433039","https://openalex.org/W4387101794","https://openalex.org/W4289743203","https://openalex.org/W2047759772","https://openalex.org/W2136936512"],"abstract_inverted_index":{"In":[0,53],"this":[1,50],"paper,":[2],"we":[3,71],"study":[4],"the":[5,11,19,65,82,101,105,112,126,132,149,152],"problem":[6],"of":[7,21,81,88,134,139,151],"secure":[8,142],"communication":[9],"over":[10],"broadcast":[12,47],"channel":[13],"with":[14,78,118],"receiver":[15],"side":[16],"information,":[17],"under":[18],"lens":[20],"individual":[22,55],"secrecy":[23,51,56,154],"constraints":[24],"(i.e.,":[25],"information":[26],"leakage":[27],"from":[28],"each":[29],"message":[30],"to":[31,49,96,108,115,125],"an":[32,73],"eavesdropper":[33,94],"is":[34,62],"made":[35],"vanishing).":[36],"Several":[37],"coding":[38,66],"schemes":[39],"are":[40,145],"proposed":[41],"by":[42],"extending":[43],"known":[44],"results":[45],"in":[46,64],"channels":[48],"setting.":[52],"particular,":[54],"provided":[57],"via":[58],"one-time":[59],"pad":[60],"signal":[61],"utilized":[63],"schemes.":[67],"As":[68],"a":[69,79,90,109,116,121,136],"result,":[70],"obtain":[72],"achievable":[74],"rate":[75],"region":[76,84,103],"together":[77],"characterization":[80],"capacity":[83,102],"for":[85,104],"special":[86],"cases":[87],"either":[89],"weak":[91],"or":[92],"strong":[93],"(compared":[95],"both":[97],"legitimate":[98],"receivers).":[99],"Interestingly,":[100],"former":[106],"corresponds":[107,114],"line":[110],"and":[111],"latter":[113],"square":[117],"missing":[119],"corners;":[120],"phenomenon":[122],"occurring":[123],"due":[124],"coupling":[127],"between":[128],"user's":[129],"rates.":[130],"At":[131],"expense":[133],"having":[135],"weaker":[137],"notion":[138],"security,":[140],"positive":[141],"transmission":[143],"rates":[144],"always":[146],"guaranteed,":[147],"unlike":[148],"case":[150],"joint":[153],"constraint.":[155]},"counts_by_year":[{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
