{"id":"https://openalex.org/W2743973278","doi":"https://doi.org/10.1109/isit.2017.8006907","title":"On secure asymmetric multilevel diversity coding systems","display_name":"On secure asymmetric multilevel diversity coding systems","publication_year":2017,"publication_date":"2017-06-01","ids":{"openalex":"https://openalex.org/W2743973278","doi":"https://doi.org/10.1109/isit.2017.8006907","mag":"2743973278"},"language":"en","primary_location":{"id":"doi:10.1109/isit.2017.8006907","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2017.8006907","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049701424","display_name":"Congduan Li","orcid":"https://orcid.org/0000-0003-0495-332X"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":true,"raw_author_name":"Congduan Li","raw_affiliation_strings":["Department of Computer Science, City University of Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, City University of Hong Kong","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027528912","display_name":"Xuan Guang","orcid":"https://orcid.org/0000-0002-0928-421X"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuan Guang","raw_affiliation_strings":["Institute of Network Coding, The Chinese University of Hong Kong"],"affiliations":[{"raw_affiliation_string":"Institute of Network Coding, The Chinese University of Hong Kong","institution_ids":["https://openalex.org/I177725633"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079559561","display_name":"Chee Wei Tan","orcid":"https://orcid.org/0000-0002-6624-9752"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Chee Wei Tan","raw_affiliation_strings":["Department of Computer Science, City University of Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, City University of Hong Kong","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038760786","display_name":"Raymond W. Yeung","orcid":"https://orcid.org/0000-0001-7386-4027"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Raymond W. Yeung","raw_affiliation_strings":["Institute of Network Coding, The Chinese University of Hong Kong"],"affiliations":[{"raw_affiliation_string":"Institute of Network Coding, The Chinese University of Hong Kong","institution_ids":["https://openalex.org/I177725633"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5049701424"],"corresponding_institution_ids":["https://openalex.org/I168719708"],"apc_list":null,"apc_paid":null,"fwci":0.6216,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.72165834,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"2138","last_page":"2142"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.7697675228118896},{"id":"https://openalex.org/keywords/information-theoretic-security","display_name":"Information-theoretic security","score":0.6691446304321289},{"id":"https://openalex.org/keywords/counterexample","display_name":"Counterexample","score":0.6121294498443604},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5845915079116821},{"id":"https://openalex.org/keywords/superposition-principle","display_name":"Superposition principle","score":0.5777212977409363},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5020437240600586},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.48041439056396484},{"id":"https://openalex.org/keywords/encoder","display_name":"Encoder","score":0.45477670431137085},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.36271369457244873},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.31194472312927246},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.19982945919036865},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.07109171152114868}],"concepts":[{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.7697675228118896},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.6691446304321289},{"id":"https://openalex.org/C162838799","wikidata":"https://www.wikidata.org/wiki/Q596077","display_name":"Counterexample","level":2,"score":0.6121294498443604},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5845915079116821},{"id":"https://openalex.org/C27753989","wikidata":"https://www.wikidata.org/wiki/Q284885","display_name":"Superposition principle","level":2,"score":0.5777212977409363},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5020437240600586},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.48041439056396484},{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.45477670431137085},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.36271369457244873},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.31194472312927246},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.19982945919036865},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.07109171152114868},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit.2017.8006907","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2017.8006907","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W581264992","https://openalex.org/W954089079","https://openalex.org/W2006947308","https://openalex.org/W2035732803","https://openalex.org/W2050065433","https://openalex.org/W2101526130","https://openalex.org/W2106570206","https://openalex.org/W2109394932","https://openalex.org/W2118406177","https://openalex.org/W2120085609","https://openalex.org/W2141420453","https://openalex.org/W2603289843","https://openalex.org/W2914714618","https://openalex.org/W2962901739","https://openalex.org/W3103908810","https://openalex.org/W3105115639","https://openalex.org/W4230830692","https://openalex.org/W6736405624"],"related_works":["https://openalex.org/W2114007974","https://openalex.org/W2150528942","https://openalex.org/W2022046490","https://openalex.org/W2154832352","https://openalex.org/W1483037127","https://openalex.org/W2898567960","https://openalex.org/W4387963661","https://openalex.org/W2340481533","https://openalex.org/W2036210457","https://openalex.org/W2369043755"],"abstract_inverted_index":{"Whether":[0],"superposition":[1,113],"(source":[2],"separation)":[3],"Is":[4],"optimal":[5,97,119],"for":[6,98,120],"the":[7,33,51,58,63,66,71,105],"asymmetric":[8],"multilevel":[9,108],"diversity":[10,109],"coding":[11,110],"systems":[12,111],"(AMDCS)":[13],"with":[14,78,104],"perfect":[15,28],"secrecy":[16,29],"is":[17,30,68,87,91,114],"answered":[18],"in":[19,102,122],"this":[20,99,125],"paper":[21],"by":[22],"studying":[23],"a":[24],"non-trivial":[25],"example.":[26],"Threshold":[27],"added":[31],"to":[32,41,116],"AMDCS":[34,76],"model.":[35],"The":[36,74],"eavesdropper":[37],"may":[38],"have":[39],"access":[40],"any":[42],"one":[43,48],"but":[44,53],"not":[45,69,118],"more":[46],"than":[47],"subset":[49,67],"of":[50,65],"channels":[52],"can":[54],"get":[55],"nothing":[56],"about":[57],"sources,":[59,80],"as":[60,62],"long":[61],"size":[64],"above":[70],"security":[72,84],"level.":[73],"secure":[75,106],"(S-AMDCS)":[77],"five":[79],"four":[81],"encoders":[82],"and":[83,89],"level":[85],"two":[86],"solved":[88],"it":[90],"shown":[92,115],"that":[93],"linear":[94],"codes":[95],"are":[96],"instance.":[100],"However,":[101],"contrast":[103],"symmetric":[107],"(S-SMDCS),":[112],"be":[117],"S-AMDCS":[121],"general":[123],"from":[124],"counterexample.":[126]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
