{"id":"https://openalex.org/W2902914705","doi":"https://doi.org/10.1109/itw.2018.8613305","title":"Secure physical layer network coding versus secure network coding","display_name":"Secure physical layer network coding versus secure network coding","publication_year":2018,"publication_date":"2018-11-01","ids":{"openalex":"https://openalex.org/W2902914705","doi":"https://doi.org/10.1109/itw.2018.8613305","mag":"2902914705"},"language":"en","primary_location":{"id":"doi:10.1109/itw.2018.8613305","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itw.2018.8613305","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE Information Theory Workshop (ITW)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024634142","display_name":"Masahito Hayashi","orcid":"https://orcid.org/0000-0003-3104-1000"},"institutions":[{"id":"https://openalex.org/I3045169105","display_name":"Southern University of Science and Technology","ror":"https://ror.org/049tv2d57","country_code":"CN","type":"education","lineage":["https://openalex.org/I3045169105"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Masahito Hayashi","raw_affiliation_strings":["Shenzhen Institute for Quantum Science and Engineering, Southern University of Science and Technology"],"affiliations":[{"raw_affiliation_string":"Shenzhen Institute for Quantum Science and Engineering, Southern University of Science and Technology","institution_ids":["https://openalex.org/I3045169105"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5024634142"],"corresponding_institution_ids":["https://openalex.org/I3045169105"],"apc_list":null,"apc_paid":null,"fwci":0.9227,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.78580141,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12791","display_name":"Full-Duplex Wireless Communications","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/linear-network-coding","display_name":"Linear network coding","score":0.7643119096755981},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7041761875152588},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6633421182632446},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.5087698101997375},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.5079739689826965},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.47694316506385803},{"id":"https://openalex.org/keywords/network-layer","display_name":"Network layer","score":0.4297768771648407},{"id":"https://openalex.org/keywords/layer","display_name":"Layer (electronics)","score":0.366887629032135},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34502896666526794},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.18801936507225037},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.11362037062644958},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.10521861910820007},{"id":"https://openalex.org/keywords/materials-science","display_name":"Materials science","score":0.06336665153503418}],"concepts":[{"id":"https://openalex.org/C138293262","wikidata":"https://www.wikidata.org/wiki/Q1089578","display_name":"Linear network coding","level":3,"score":0.7643119096755981},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7041761875152588},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6633421182632446},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.5087698101997375},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.5079739689826965},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.47694316506385803},{"id":"https://openalex.org/C117468950","wikidata":"https://www.wikidata.org/wiki/Q208074","display_name":"Network layer","level":3,"score":0.4297768771648407},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.366887629032135},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34502896666526794},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.18801936507225037},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.11362037062644958},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.10521861910820007},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.06336665153503418},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.0},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/itw.2018.8613305","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itw.2018.8613305","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE Information Theory Workshop (ITW)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.49000000953674316,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W18139138","https://openalex.org/W1536351097","https://openalex.org/W1731774588","https://openalex.org/W1809190717","https://openalex.org/W1975099099","https://openalex.org/W2005196269","https://openalex.org/W2006947308","https://openalex.org/W2100770837","https://openalex.org/W2102613170","https://openalex.org/W2105831729","https://openalex.org/W2106570206","https://openalex.org/W2109371116","https://openalex.org/W2129826397","https://openalex.org/W2135808061","https://openalex.org/W2136395129","https://openalex.org/W2168702691","https://openalex.org/W2169537302","https://openalex.org/W2220794438","https://openalex.org/W2593319301","https://openalex.org/W2610741318","https://openalex.org/W2743115881","https://openalex.org/W2798479786","https://openalex.org/W2908224637","https://openalex.org/W2962912127","https://openalex.org/W3101413094","https://openalex.org/W3102172735","https://openalex.org/W3196852279","https://openalex.org/W6600739974","https://openalex.org/W6632105784","https://openalex.org/W6680315945","https://openalex.org/W6750900285"],"related_works":["https://openalex.org/W2411222674","https://openalex.org/W2563246150","https://openalex.org/W4319165250","https://openalex.org/W1146749182","https://openalex.org/W2096072646","https://openalex.org/W2171073911","https://openalex.org/W2154249443","https://openalex.org/W2167638421","https://openalex.org/W2152610849","https://openalex.org/W2074236728"],"abstract_inverted_index":{"Secure":[0],"network":[1,16,38,53,60,80,103,114],"coding":[2,61,74,104],"realizes":[3,105],"the":[4,7,10,34,37,43,51,79],"secrecy":[5],"of":[6,20,25,36,73,86,96],"message":[8,11,69],"when":[9,78],"is":[12,62,81],"transmitted":[13],"via":[14],"noiseless":[15],"and":[17],"a":[18,23,63,68,71,84,106],"part":[19,24],"edges":[21],"or":[22],"intermediate":[26],"nodes":[27,77],"are":[28],"eavesdropped.":[29],"In":[30,55,89],"this":[31,90],"framework,":[32],"if":[33],"channels":[35],"has":[39],"noise,":[40],"we":[41,92],"apply":[42],"error":[44],"correction":[45],"to":[46,65],"noisy":[47,87],"channel":[48],"before":[49],"applying":[50],"secure":[52,57,100,113],"coding.":[54,115],"contrast,":[56],"physical":[58,101],"layer":[59,102],"method":[64],"securely":[66],"transmit":[67],"by":[70,112],"combination":[72],"operation":[75],"on":[76],"given":[82],"as":[83],"set":[85],"channels.":[88],"paper,":[91],"give":[93],"several":[94],"examples":[95],"network,":[97],"in":[98],"which,":[99],"performance":[107],"that":[108],"cannot":[109],"be":[110],"realized":[111]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":3},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
