{"id":"https://openalex.org/W2742735145","doi":"https://doi.org/10.1109/isit.2017.8007101","title":"Individually-secure multi-source multicast","display_name":"Individually-secure multi-source multicast","publication_year":2017,"publication_date":"2017-06-01","ids":{"openalex":"https://openalex.org/W2742735145","doi":"https://doi.org/10.1109/isit.2017.8007101","mag":"2742735145"},"language":"en","primary_location":{"id":"doi:10.1109/isit.2017.8007101","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2017.8007101","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050033032","display_name":"Asaf Cohen","orcid":"https://orcid.org/0000-0002-9567-5793"},"institutions":[{"id":"https://openalex.org/I2801720294","display_name":"Bakke Graduate University","ror":"https://ror.org/024s2tr48","country_code":"US","type":"education","lineage":["https://openalex.org/I2801720294"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Asaf Cohen","raw_affiliation_strings":["BGU"],"affiliations":[{"raw_affiliation_string":"BGU","institution_ids":["https://openalex.org/I2801720294"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033417463","display_name":"Alejandro Cohen","orcid":"https://orcid.org/0000-0002-5664-2518"},"institutions":[{"id":"https://openalex.org/I2801720294","display_name":"Bakke Graduate University","ror":"https://ror.org/024s2tr48","country_code":"US","type":"education","lineage":["https://openalex.org/I2801720294"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Alejandro Cohen","raw_affiliation_strings":["BGU"],"affiliations":[{"raw_affiliation_string":"BGU","institution_ids":["https://openalex.org/I2801720294"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075370174","display_name":"Muriel M\u00e9dard","orcid":"https://orcid.org/0000-0003-4059-407X"},"institutions":[{"id":"https://openalex.org/I4210109586","display_name":"Moscow Institute of Thermal Technology","ror":"https://ror.org/021es5e59","country_code":"RU","type":"facility","lineage":["https://openalex.org/I4210109586"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Muriel Medard","raw_affiliation_strings":["MIT"],"affiliations":[{"raw_affiliation_string":"MIT","institution_ids":["https://openalex.org/I4210109586"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041053913","display_name":"Omer Gurewitz","orcid":"https://orcid.org/0000-0002-2685-2856"},"institutions":[{"id":"https://openalex.org/I2801720294","display_name":"Bakke Graduate University","ror":"https://ror.org/024s2tr48","country_code":"US","type":"education","lineage":["https://openalex.org/I2801720294"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Omer Gurewitz","raw_affiliation_strings":["BGU"],"affiliations":[{"raw_affiliation_string":"BGU","institution_ids":["https://openalex.org/I2801720294"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5050033032"],"corresponding_institution_ids":["https://openalex.org/I2801720294"],"apc_list":null,"apc_paid":null,"fwci":0.8288,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.76583385,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"104","issue":null,"first_page":"3105","last_page":"3109"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.986299991607666,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7823563814163208},{"id":"https://openalex.org/keywords/multicast","display_name":"Multicast","score":0.6914271116256714},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6179677248001099},{"id":"https://openalex.org/keywords/converse","display_name":"Converse","score":0.6098271608352661},{"id":"https://openalex.org/keywords/dissemination","display_name":"Dissemination","score":0.48499366641044617},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.44222715497016907},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.43559858202934265},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43434929847717285},{"id":"https://openalex.org/keywords/principal","display_name":"Principal (computer security)","score":0.4152531027793884},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10690844058990479},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.09462830424308777},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.09185659885406494}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7823563814163208},{"id":"https://openalex.org/C32295351","wikidata":"https://www.wikidata.org/wiki/Q899288","display_name":"Multicast","level":2,"score":0.6914271116256714},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6179677248001099},{"id":"https://openalex.org/C2776809875","wikidata":"https://www.wikidata.org/wiki/Q1375963","display_name":"Converse","level":2,"score":0.6098271608352661},{"id":"https://openalex.org/C101780184","wikidata":"https://www.wikidata.org/wiki/Q840576","display_name":"Dissemination","level":2,"score":0.48499366641044617},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.44222715497016907},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.43559858202934265},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43434929847717285},{"id":"https://openalex.org/C144559511","wikidata":"https://www.wikidata.org/wiki/Q2986279","display_name":"Principal (computer security)","level":2,"score":0.4152531027793884},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10690844058990479},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.09462830424308777},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.09185659885406494},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit.2017.8007101","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2017.8007101","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.41999998688697815,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W68293075","https://openalex.org/W1538771458","https://openalex.org/W1572409872","https://openalex.org/W1618774954","https://openalex.org/W1626922264","https://openalex.org/W1979760651","https://openalex.org/W1981346216","https://openalex.org/W2006947308","https://openalex.org/W2014808714","https://openalex.org/W2048235391","https://openalex.org/W2056327536","https://openalex.org/W2106403318","https://openalex.org/W2106570206","https://openalex.org/W2123562143","https://openalex.org/W2139379087","https://openalex.org/W2151893328","https://openalex.org/W2171100910","https://openalex.org/W2290339182","https://openalex.org/W2369127983","https://openalex.org/W2479171114","https://openalex.org/W2583477080","https://openalex.org/W2962852249","https://openalex.org/W2963283980","https://openalex.org/W6602698672","https://openalex.org/W6680766608","https://openalex.org/W6732995259"],"related_works":["https://openalex.org/W2387449261","https://openalex.org/W2418518962","https://openalex.org/W2963377682","https://openalex.org/W2043159103","https://openalex.org/W2391769344","https://openalex.org/W2359260952","https://openalex.org/W4297790016","https://openalex.org/W2769269860","https://openalex.org/W2020701214","https://openalex.org/W4287585143"],"abstract_inverted_index":{"The":[0],"principal":[1],"mission":[2],"of":[3,29,58,149],"Multi-Source":[4],"Multicast":[5],"(MSM)":[6],"is":[7,22,35,41,48,52,77,91,143,157,172],"to":[8,18,42,54,101,162,174,181,185],"disseminate":[9],"all":[10,13,19,72,80],"messages":[11,33,81],"from":[12],"sources":[14],"in":[15,24,103],"a":[16,44,56,64,85,140],"network":[17,45,60],"destinations.":[20],"MSM":[21,89,176],"utilized":[23],"numerous":[25],"applications.":[26],"In":[27,105],"many":[28],"them,":[30],"securing":[31],"the":[32,59,68,73,96,115,128,146,150,154,158,169,186],"disseminated":[34],"critical.":[36],"A":[37],"common":[38],"secure":[39],"model":[40],"consider":[43,109],"where":[46],"there":[47],"an":[49,92],"eavesdropper":[50,69,116],"which":[51,66,112],"able":[53],"observe":[55],"subset":[57],"links,":[61],"and":[62,95,136,177],"seek":[63],"code":[65],"keeps":[67],"ignorant":[70],"regarding":[71],"messages.":[74],"While":[75],"this":[76,106],"solved":[78],"when":[79],"are":[82,99],"located":[83],"at":[84,145],"single":[86],"source,":[87],"Secure":[88],"(SMSM)":[90],"open":[93],"problem,":[94],"rates":[97],"required":[98],"hard":[100],"characterize":[102,127],"general.":[104],"paper,":[107],"we":[108,166],"Individual":[110],"Security,":[111],"promises":[113],"that":[114,138,152,168],"has":[117],"zero":[118],"mutual":[119],"information":[120],"with":[121],"each":[122],"message":[123],"individually.":[124],"We":[125],"completely":[126],"rate":[129],"region":[130],"for":[131],"SMSM":[132],"under":[133],"individual":[134],"security,":[135],"show":[137,167],"such":[139],"security":[141,187],"level":[142],"achievable":[144],"full":[147],"capacity":[148],"network,":[151],"is,":[153],"cut-set":[155],"bound":[156],"matching":[159],"converse,":[160],"similar":[161,173],"non-secure":[163,175],"MSM.":[164],"Moreover,":[165],"field":[170],"size":[171],"does":[178],"not":[179],"have":[180],"be":[182],"larger":[183],"due":[184],"constraint.":[188]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
