{"id":"https://openalex.org/W2044734830","doi":"https://doi.org/10.1109/ita.2012.6181821","title":"Securing inductively-coupled communication","display_name":"Securing inductively-coupled communication","publication_year":2012,"publication_date":"2012-02-01","ids":{"openalex":"https://openalex.org/W2044734830","doi":"https://doi.org/10.1109/ita.2012.6181821","mag":"2044734830"},"language":"en","primary_location":{"id":"doi:10.1109/ita.2012.6181821","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ita.2012.6181821","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 Information Theory and Applications Workshop","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065423139","display_name":"Lav R. Varshney","orcid":"https://orcid.org/0000-0003-2798-5308"},"institutions":[{"id":"https://openalex.org/I4210114115","display_name":"IBM Research - Thomas J. Watson Research Center","ror":"https://ror.org/0265w5591","country_code":"US","type":"facility","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210114115"]},{"id":"https://openalex.org/I63966007","display_name":"Massachusetts Institute of Technology","ror":"https://ror.org/042nb2s44","country_code":"US","type":"education","lineage":["https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Lav R. Varshney","raw_affiliation_strings":["IBM Thomas J. Watson Research Center, USA","Research Laboratory of Electronics, Massachusetts Institute of Technology, USA"],"affiliations":[{"raw_affiliation_string":"IBM Thomas J. Watson Research Center, USA","institution_ids":["https://openalex.org/I4210114115"]},{"raw_affiliation_string":"Research Laboratory of Electronics, Massachusetts Institute of Technology, USA","institution_ids":["https://openalex.org/I63966007"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054746425","display_name":"Pulkit Grover","orcid":"https://orcid.org/0000-0001-7651-7776"},"institutions":[{"id":"https://openalex.org/I95457486","display_name":"University of California, Berkeley","ror":"https://ror.org/01an7q238","country_code":"US","type":"education","lineage":["https://openalex.org/I95457486"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Pulkit Grover","raw_affiliation_strings":["Wireless Foundations, University of California Berkeley, USA"],"affiliations":[{"raw_affiliation_string":"Wireless Foundations, University of California Berkeley, USA","institution_ids":["https://openalex.org/I95457486"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079317491","display_name":"Anant Sahai","orcid":"https://orcid.org/0000-0001-9263-7719"},"institutions":[{"id":"https://openalex.org/I95457486","display_name":"University of California, Berkeley","ror":"https://ror.org/01an7q238","country_code":"US","type":"education","lineage":["https://openalex.org/I95457486"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Anant Sahai","raw_affiliation_strings":["Wireless Foundations, University of California Berkeley, USA"],"affiliations":[{"raw_affiliation_string":"Wireless Foundations, University of California Berkeley, USA","institution_ids":["https://openalex.org/I95457486"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5065423139"],"corresponding_institution_ids":["https://openalex.org/I4210114115","https://openalex.org/I63966007"],"apc_list":null,"apc_paid":null,"fwci":1.2483,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.8165392,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"47","last_page":"53"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11392","display_name":"Energy Harvesting in Wireless Networks","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.9298151135444641},{"id":"https://openalex.org/keywords/equivocation","display_name":"Equivocation","score":0.7796709537506104},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6822415590286255},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5859944820404053},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.46710649132728577},{"id":"https://openalex.org/keywords/communications-system","display_name":"Communications system","score":0.45288822054862976},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.43820640444755554},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4379211664199829},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.42371976375579834},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.4195139408111572},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.1968073546886444},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.17327958345413208}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.9298151135444641},{"id":"https://openalex.org/C17859611","wikidata":"https://www.wikidata.org/wiki/Q10797615","display_name":"Equivocation","level":2,"score":0.7796709537506104},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6822415590286255},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5859944820404053},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.46710649132728577},{"id":"https://openalex.org/C101765175","wikidata":"https://www.wikidata.org/wiki/Q577764","display_name":"Communications system","level":2,"score":0.45288822054862976},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.43820640444755554},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4379211664199829},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.42371976375579834},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.4195139408111572},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.1968073546886444},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.17327958345413208},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/ita.2012.6181821","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ita.2012.6181821","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 Information Theory and Applications Workshop","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.307.660","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.307.660","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://ita.ucsd.edu/workshop/12/files/paper/paper_1714.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6200000047683716,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1521995386","https://openalex.org/W1522573321","https://openalex.org/W1534823749","https://openalex.org/W1591339923","https://openalex.org/W1606202192","https://openalex.org/W1967842965","https://openalex.org/W1973674613","https://openalex.org/W1982170863","https://openalex.org/W2023348338","https://openalex.org/W2043769961","https://openalex.org/W2079364662","https://openalex.org/W2109394932","https://openalex.org/W2114669159","https://openalex.org/W2121706140","https://openalex.org/W2129589778","https://openalex.org/W2135479785","https://openalex.org/W2137457031","https://openalex.org/W2147942702","https://openalex.org/W2149261597","https://openalex.org/W2155999145","https://openalex.org/W2156214717","https://openalex.org/W2168998384","https://openalex.org/W2170263567","https://openalex.org/W2491421100","https://openalex.org/W3038067977","https://openalex.org/W4205259921","https://openalex.org/W4206315045","https://openalex.org/W4252713891","https://openalex.org/W4293702014"],"related_works":["https://openalex.org/W2157628738","https://openalex.org/W2376754011","https://openalex.org/W3022352698","https://openalex.org/W1616202922","https://openalex.org/W2514631144","https://openalex.org/W1560558670","https://openalex.org/W2160157233","https://openalex.org/W2379253205","https://openalex.org/W2059155883","https://openalex.org/W2377059850"],"abstract_inverted_index":{"Communication":[0],"over":[1],"inductively-coupled":[2,35,107],"links":[3],"is":[4,20,55,114,120],"becoming":[5],"prevalent":[6],"in":[7,123],"service":[8],"delivery":[9],"for":[10,106],"medical,":[11],"financial,":[12],"and":[13,17,31],"physical":[14],"security":[15,119],"applications":[16],"so":[18],"there":[19],"a":[21,101],"growing":[22],"need":[23],"to":[24,39,62,84],"prevent":[25],"eavesdropping.":[26],"This":[27],"paper":[28],"presents":[29],"circuit-theoretic":[30],"communication-theoretic":[32],"models":[33],"of":[34,43,66,118,125,132],"communication":[36,104],"systems.":[37],"Due":[38],"coupling,":[40],"the":[41,47,51,64,67,76,79,86,95],"presence":[42,65],"an":[44],"eavesdropper":[45,77],"detunes":[46],"transfer":[48],"function":[49],"between":[50],"legitimate":[52,80],"users.":[53],"It":[54],"shown":[56],"this":[57,99],"detuning":[58],"can":[59],"be":[60],"detected":[61],"reveal":[63],"eavesdropper.":[68],"Further,":[69],"if":[70],"capacity-approaching":[71],"codes":[72],"are":[73,82],"employed,":[74],"neither":[75],"nor":[78],"receiver":[81],"able":[83],"reconstruct":[85],"transmitted":[87],"message":[88],"with":[89],"low":[90],"error":[91],"probability,":[92],"effectively":[93],"destroying":[94],"message.":[96],"Building":[97],"on":[98],"insight,":[100],"coding-based":[102],"secure":[103],"protocol":[105],"communication,":[108],"inspired":[109],"by":[110],"quantum":[111],"key":[112],"distribution,":[113],"developed.":[115],"The":[116],"notion":[117],"defined":[121],"operationally":[122],"terms":[124],"probabilities":[126],"rather":[127],"than":[128],"through":[129],"traditional":[130],"notions":[131],"equivocation.":[133]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":3},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
