{"id":"https://openalex.org/W1992741808","doi":"https://doi.org/10.1109/isit.2014.6875056","title":"Weakly secure data exchange with Generalized Reed Solomon codes","display_name":"Weakly secure data exchange with Generalized Reed Solomon codes","publication_year":2014,"publication_date":"2014-06-01","ids":{"openalex":"https://openalex.org/W1992741808","doi":"https://doi.org/10.1109/isit.2014.6875056","mag":"1992741808"},"language":"en","primary_location":{"id":"doi:10.1109/isit.2014.6875056","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2014.6875056","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE International Symposium on Information Theory","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064545465","display_name":"Muxi Yan","orcid":null},"institutions":[{"id":"https://openalex.org/I91045830","display_name":"Texas A&M University","ror":"https://ror.org/01f5ytq51","country_code":"US","type":"education","lineage":["https://openalex.org/I91045830"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Muxi Yan","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Texas A&M University","Dept. of Electr. & Comput. Eng, Texas A&M Univ., College Station, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Texas A&M University","institution_ids":["https://openalex.org/I91045830"]},{"raw_affiliation_string":"Dept. of Electr. & Comput. Eng, Texas A&M Univ., College Station, TX, USA","institution_ids":["https://openalex.org/I91045830"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054178465","display_name":"Alex Sprintson","orcid":"https://orcid.org/0000-0002-5768-5800"},"institutions":[{"id":"https://openalex.org/I91045830","display_name":"Texas A&M University","ror":"https://ror.org/01f5ytq51","country_code":"US","type":"education","lineage":["https://openalex.org/I91045830"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Alex Sprintson","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Texas A&M University","Dept. of Electr. & Comput. Eng, Texas A&M Univ., College Station, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Texas A&M University","institution_ids":["https://openalex.org/I91045830"]},{"raw_affiliation_string":"Dept. of Electr. & Comput. Eng, Texas A&M Univ., College Station, TX, USA","institution_ids":["https://openalex.org/I91045830"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017897375","display_name":"Igor Zelenko","orcid":"https://orcid.org/0000-0001-7900-2567"},"institutions":[{"id":"https://openalex.org/I91045830","display_name":"Texas A&M University","ror":"https://ror.org/01f5ytq51","country_code":"US","type":"education","lineage":["https://openalex.org/I91045830"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Igor Zelenko","raw_affiliation_strings":["Department of Mathematics, Texas A&M University","Dept. of Math., Texas A&M Univ., College Station, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics, Texas A&M University","institution_ids":["https://openalex.org/I91045830"]},{"raw_affiliation_string":"Dept. of Math., Texas A&M Univ., College Station, TX, USA","institution_ids":["https://openalex.org/I91045830"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5064545465"],"corresponding_institution_ids":["https://openalex.org/I91045830"],"apc_list":null,"apc_paid":null,"fwci":5.5169,"has_fulltext":false,"cited_by_count":44,"citation_normalized_percentile":{"value":0.96015977,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1366","last_page":"1370"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7234392166137695},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6653332710266113},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.6178259253501892},{"id":"https://openalex.org/keywords/data-exchange","display_name":"Data exchange","score":0.5529897809028625},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.504158616065979},{"id":"https://openalex.org/keywords/finite-field","display_name":"Finite field","score":0.46344614028930664},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4612762928009033},{"id":"https://openalex.org/keywords/lossless-compression","display_name":"Lossless compression","score":0.4453731179237366},{"id":"https://openalex.org/keywords/reed\u2013solomon-error-correction","display_name":"Reed\u2013Solomon error correction","score":0.43696433305740356},{"id":"https://openalex.org/keywords/coding-theory","display_name":"Coding theory","score":0.4287254810333252},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.41928592324256897},{"id":"https://openalex.org/keywords/linear-code","display_name":"Linear code","score":0.28149914741516113},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.21659788489341736},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.19884148240089417},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.18787860870361328},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.1557042896747589},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.1528090238571167},{"id":"https://openalex.org/keywords/block-code","display_name":"Block code","score":0.1426422894001007}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7234392166137695},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6653332710266113},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.6178259253501892},{"id":"https://openalex.org/C15845906","wikidata":"https://www.wikidata.org/wiki/Q1172338","display_name":"Data exchange","level":2,"score":0.5529897809028625},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.504158616065979},{"id":"https://openalex.org/C77926391","wikidata":"https://www.wikidata.org/wiki/Q603880","display_name":"Finite field","level":2,"score":0.46344614028930664},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4612762928009033},{"id":"https://openalex.org/C81081738","wikidata":"https://www.wikidata.org/wiki/Q55542","display_name":"Lossless compression","level":3,"score":0.4453731179237366},{"id":"https://openalex.org/C78065487","wikidata":"https://www.wikidata.org/wiki/Q1061598","display_name":"Reed\u2013Solomon error correction","level":5,"score":0.43696433305740356},{"id":"https://openalex.org/C113709454","wikidata":"https://www.wikidata.org/wiki/Q602136","display_name":"Coding theory","level":2,"score":0.4287254810333252},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.41928592324256897},{"id":"https://openalex.org/C2400350","wikidata":"https://www.wikidata.org/wiki/Q1752667","display_name":"Linear code","level":4,"score":0.28149914741516113},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.21659788489341736},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.19884148240089417},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.18787860870361328},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.1557042896747589},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.1528090238571167},{"id":"https://openalex.org/C157125643","wikidata":"https://www.wikidata.org/wiki/Q884707","display_name":"Block code","level":3,"score":0.1426422894001007},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit.2014.6875056","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2014.6875056","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE International Symposium on Information Theory","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W68293075","https://openalex.org/W1492966477","https://openalex.org/W1965032536","https://openalex.org/W2024301368","https://openalex.org/W2050536468","https://openalex.org/W2127064821","https://openalex.org/W2130507035","https://openalex.org/W2144554454","https://openalex.org/W2153753235","https://openalex.org/W2153984637","https://openalex.org/W2531850551","https://openalex.org/W2949916492","https://openalex.org/W2964144344","https://openalex.org/W3104735109","https://openalex.org/W6602698672","https://openalex.org/W6681243730","https://openalex.org/W6785762072"],"related_works":["https://openalex.org/W373615522","https://openalex.org/W2625239423","https://openalex.org/W4298280412","https://openalex.org/W2949501833","https://openalex.org/W2963870842","https://openalex.org/W1610556314","https://openalex.org/W1517974013","https://openalex.org/W2230283315","https://openalex.org/W4238916473","https://openalex.org/W4391468556"],"abstract_inverted_index":{"We":[0,77,143],"focus":[1],"on":[2,83],"secure":[3,56],"data":[4,15,27],"exchange":[5,14,28],"among":[6],"a":[7,23,54,79,101,108],"group":[8],"of":[9,20,34,69,139,152],"wireless":[10],"clients.":[11,76],"The":[12,26,88],"clients":[13],"by":[16,74],"broadcasting":[17],"linear":[18],"combinations":[19],"packets":[21,72],"over":[22,94,100],"lossless":[24],"channel.":[25],"is":[29,51,115,169],"performed":[30],"in":[31,171],"the":[32,41,61,70,75,95,119,136,140,150,167],"presence":[33],"an":[35,130,145],"eavesdropper":[36,62],"who":[37],"has":[38,90],"access":[39],"to":[40,52,66,110,134],"channel":[42],"and":[43,106,126,155],"can":[44],"obtain":[45],"all":[46],"transmitted":[47],"data.":[48],"Our":[49,162],"goal":[50],"develop":[53],"weakly":[55],"coding":[57],"scheme":[58],"that":[59,112,148,166],"prevents":[60],"from":[63],"being":[64],"able":[65],"decode":[67],"any":[68],"original":[71],"held":[73],"present":[78],"randomized":[80],"algorithm":[81,89,133,154,168],"based":[82],"Generalized":[84],"Reed-Solomon":[85],"(GRS)":[86],"codes.":[87],"two":[91],"key":[92],"advantages":[93],"previous":[96,120],"solutions:":[97],"it":[98],"operates":[99],"small":[102],"(polynomial-size)":[103],"finite":[104],"field":[105,124],"provides":[107],"way":[109],"verify":[111,135],"constructed":[113,141],"code":[114],"feasible.":[116],"In":[117],"contrast,":[118],"approaches":[121],"require":[122],"exponential":[123],"size":[125],"do":[127],"not":[128],"provide":[129],"efficient":[131,170],"(polynomial-time)":[132],"secrecy":[137],"properties":[138],"code.":[142],"formulate":[144],"algebraic-geometric":[146],"conjecture":[147],"implies":[149],"correctness":[151],"our":[153],"prove":[156],"its":[157],"validity":[158],"for":[159],"special":[160],"cases.":[161],"simulation":[163],"results":[164],"indicate":[165],"practical":[172],"settings.":[173]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":12},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":6},{"year":2014,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
