{"id":"https://openalex.org/W2744300671","doi":"https://doi.org/10.1109/isit.2017.8006905","title":"A new broadcast wiretap channel model","display_name":"A new broadcast wiretap channel model","publication_year":2017,"publication_date":"2017-06-01","ids":{"openalex":"https://openalex.org/W2744300671","doi":"https://doi.org/10.1109/isit.2017.8006905","mag":"2744300671"},"language":"en","primary_location":{"id":"doi:10.1109/isit.2017.8006905","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2017.8006905","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027117881","display_name":"Mohamed Nafea","orcid":"https://orcid.org/0000-0003-4631-6767"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mohamed Nafea","raw_affiliation_strings":["Wireless Communications and Networking Laboratory (WCAN), The Pennsylvania State University, University Park, PA"],"affiliations":[{"raw_affiliation_string":"Wireless Communications and Networking Laboratory (WCAN), The Pennsylvania State University, University Park, PA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039328157","display_name":"Aylin Yener","orcid":"https://orcid.org/0000-0003-0820-3390"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Aylin Yener","raw_affiliation_strings":["Wireless Communications and Networking Laboratory (WCAN), The Pennsylvania State University, University Park, PA"],"affiliations":[{"raw_affiliation_string":"Wireless Communications and Networking Laboratory (WCAN), The Pennsylvania State University, University Park, PA","institution_ids":["https://openalex.org/I130769515"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5027117881"],"corresponding_institution_ids":["https://openalex.org/I130769515"],"apc_list":null,"apc_paid":null,"fwci":0.5734,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.69550595,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"2128","last_page":"2132"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9883000254631042,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.8246734142303467},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.7342923879623413},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6375679969787598},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.46423402428627014},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.3366413116455078},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.30129218101501465},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2941341996192932},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.1369093358516693}],"concepts":[{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.8246734142303467},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.7342923879623413},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6375679969787598},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.46423402428627014},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.3366413116455078},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30129218101501465},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2941341996192932},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.1369093358516693}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit.2017.8006905","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2017.8006905","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1542516891","https://openalex.org/W1639833317","https://openalex.org/W2043769961","https://openalex.org/W2178986096","https://openalex.org/W2233598973","https://openalex.org/W2515482090","https://openalex.org/W2545362398","https://openalex.org/W2914714618","https://openalex.org/W3105531017","https://openalex.org/W4300840296"],"related_works":["https://openalex.org/W2493929861","https://openalex.org/W2016567611","https://openalex.org/W2475541339","https://openalex.org/W565335793","https://openalex.org/W2363071176","https://openalex.org/W2107199751","https://openalex.org/W4243812570","https://openalex.org/W4300441478","https://openalex.org/W2062965938","https://openalex.org/W99756173"],"abstract_inverted_index":{"A":[0],"new":[1,59,63,70,87],"broadcast":[2,93],"wiretap":[3,88],"channel":[4,89],"(B-WTC)":[5],"with":[6,65,72],"a":[7,13,28],"wiretapper":[8],"who":[9],"noiselessly":[10],"taps":[11],"into":[12],"fixed-length":[14],"subset":[15],"of":[16,20,57],"the":[17,25,45,58,62,69,84,92],"transmitted":[18],"symbols":[19],"her":[21],"choice,":[22],"and":[23,68,75],"observes":[24],"remainder":[26],"through":[27],"noisy":[29,77],"channel,":[30],"is":[31,48],"studied.":[32],"An":[33],"achievable":[34],"strong":[35],"secrecy":[36,51],"rate":[37],"region":[38],"which":[39],"extends":[40],"Marton's":[41],"inner":[42],"bound":[43],"to":[44,91],"proposed":[46,86],"setting,":[47],"derived.":[49],"Strong":[50],"capacity":[52],"regions":[53],"for":[54],"two":[55],"classes":[56],"B-WTC,":[60],"namely":[61],"B-WTC":[64,71],"deterministic":[66],"receivers,":[67],"degraded":[73],"receivers":[74],"more":[76],"wiretapper,":[78],"are":[79],"identified.":[80],"These":[81],"results":[82],"extend":[83],"recently":[85],"model":[90],"setting.":[94]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
