{"id":"https://openalex.org/W3125923158","doi":"https://doi.org/10.1109/jsait.2021.3054663","title":"Coded Caching in the Presence of a Wire and a Cache Tapping Adversary of Type II","display_name":"Coded Caching in the Presence of a Wire and a Cache Tapping Adversary of Type II","publication_year":2021,"publication_date":"2021-01-26","ids":{"openalex":"https://openalex.org/W3125923158","doi":"https://doi.org/10.1109/jsait.2021.3054663","mag":"3125923158"},"language":"en","primary_location":{"id":"doi:10.1109/jsait.2021.3054663","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsait.2021.3054663","pdf_url":null,"source":{"id":"https://openalex.org/S4210211895","display_name":"IEEE Journal on Selected Areas in Information Theory","issn_l":"2641-8770","issn":["2641-8770"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Journal on Selected Areas in Information Theory","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027117881","display_name":"Mohamed Nafea","orcid":"https://orcid.org/0000-0003-4631-6767"},"institutions":[{"id":"https://openalex.org/I71792333","display_name":"University of Detroit Mercy","ror":"https://ror.org/0037qsh65","country_code":"US","type":"education","lineage":["https://openalex.org/I71792333"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mohamed Nafea","raw_affiliation_strings":["Electrical and Computer Engineering Department, University of Detroit Mercy, Detroit, MI, USA"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering Department, University of Detroit Mercy, Detroit, MI, USA","institution_ids":["https://openalex.org/I71792333"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039328157","display_name":"Aylin Yener","orcid":"https://orcid.org/0000-0003-0820-3390"},"institutions":[{"id":"https://openalex.org/I52357470","display_name":"The Ohio State University","ror":"https://ror.org/00rs6vg23","country_code":"US","type":"education","lineage":["https://openalex.org/I52357470"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Aylin Yener","raw_affiliation_strings":["Department of Computer Science and Engineering, Ohio State University, Columbus, OH, USA","Department of Electrical and Computer Engineering, Ohio State University, Columbus, OH, USA","Department of Integrated Systems Engineering, Ohio State University, Columbus, OH, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Ohio State University, Columbus, OH, USA","institution_ids":["https://openalex.org/I52357470"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Ohio State University, Columbus, OH, USA","institution_ids":["https://openalex.org/I52357470"]},{"raw_affiliation_string":"Department of Integrated Systems Engineering, Ohio State University, Columbus, OH, USA","institution_ids":["https://openalex.org/I52357470"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5027117881"],"corresponding_institution_ids":["https://openalex.org/I71792333"],"apc_list":null,"apc_paid":null,"fwci":0.3056,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.56350169,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"2","issue":"1","first_page":"65","last_page":"81"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.8245935440063477},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8031208515167236},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6858137845993042},{"id":"https://openalex.org/keywords/information-theoretic-security","display_name":"Information-theoretic security","score":0.6849038004875183},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.6330753564834595},{"id":"https://openalex.org/keywords/converse","display_name":"Converse","score":0.5739783048629761},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.5027527809143066},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4786188006401062},{"id":"https://openalex.org/keywords/cpu-cache","display_name":"CPU cache","score":0.44756758213043213},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.43418413400650024},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4314599633216858},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.42578569054603577},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.4229249358177185},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.2824211120605469},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.22742944955825806},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12020626664161682},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.08646687865257263}],"concepts":[{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.8245935440063477},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8031208515167236},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6858137845993042},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.6849038004875183},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.6330753564834595},{"id":"https://openalex.org/C2776809875","wikidata":"https://www.wikidata.org/wiki/Q1375963","display_name":"Converse","level":2,"score":0.5739783048629761},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.5027527809143066},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4786188006401062},{"id":"https://openalex.org/C189783530","wikidata":"https://www.wikidata.org/wiki/Q352090","display_name":"CPU cache","level":3,"score":0.44756758213043213},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.43418413400650024},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4314599633216858},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.42578569054603577},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.4229249358177185},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.2824211120605469},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22742944955825806},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12020626664161682},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.08646687865257263},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jsait.2021.3054663","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsait.2021.3054663","pdf_url":null,"source":{"id":"https://openalex.org/S4210211895","display_name":"IEEE Journal on Selected Areas in Information Theory","issn_l":"2641-8770","issn":["2641-8770"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Journal on Selected Areas in Information Theory","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6899999976158142,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G288519320","display_name":null,"funder_award_id":"CCF 2105872","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":61,"referenced_works":["https://openalex.org/W1512322851","https://openalex.org/W1542516891","https://openalex.org/W1544602402","https://openalex.org/W1606035500","https://openalex.org/W1639833317","https://openalex.org/W1966660858","https://openalex.org/W1990395546","https://openalex.org/W2011460700","https://openalex.org/W2026102701","https://openalex.org/W2037260558","https://openalex.org/W2043769961","https://openalex.org/W2044951885","https://openalex.org/W2079618300","https://openalex.org/W2083766832","https://openalex.org/W2106248279","https://openalex.org/W2108777864","https://openalex.org/W2109394932","https://openalex.org/W2112912183","https://openalex.org/W2216774299","https://openalex.org/W2233598973","https://openalex.org/W2409479574","https://openalex.org/W2478708596","https://openalex.org/W2515772480","https://openalex.org/W2527594325","https://openalex.org/W2547052808","https://openalex.org/W2589022566","https://openalex.org/W2591528568","https://openalex.org/W2740138032","https://openalex.org/W2742841286","https://openalex.org/W2744300671","https://openalex.org/W2756122816","https://openalex.org/W2775838555","https://openalex.org/W2777034101","https://openalex.org/W2887138199","https://openalex.org/W2887852002","https://openalex.org/W2912432720","https://openalex.org/W2914714618","https://openalex.org/W2953871172","https://openalex.org/W2962793242","https://openalex.org/W2963102996","https://openalex.org/W2963144950","https://openalex.org/W2963178642","https://openalex.org/W2963305774","https://openalex.org/W2963352975","https://openalex.org/W2963360080","https://openalex.org/W2963492973","https://openalex.org/W2963503220","https://openalex.org/W2963594337","https://openalex.org/W2963602389","https://openalex.org/W2963665544","https://openalex.org/W2963966831","https://openalex.org/W2964251464","https://openalex.org/W2973146870","https://openalex.org/W2974299843","https://openalex.org/W2975913276","https://openalex.org/W3004195166","https://openalex.org/W3006180973","https://openalex.org/W3098373284","https://openalex.org/W3103610239","https://openalex.org/W3105531017","https://openalex.org/W3106164725"],"related_works":["https://openalex.org/W2150528942","https://openalex.org/W2154832352","https://openalex.org/W1483037127","https://openalex.org/W2340481533","https://openalex.org/W2898567960","https://openalex.org/W2167303720","https://openalex.org/W2549803267","https://openalex.org/W2497617944","https://openalex.org/W1563139915","https://openalex.org/W2369043755"],"abstract_inverted_index":{"This":[0],"paper":[1],"introduces":[2],"the":[3,8,20,59,67,70,82,86,93,105,113,145,155,158,166],"notion":[4],"of":[5,12,22,69,193],"cache-tapping":[6],"into":[7,38],"information":[9],"theoretic":[10],"models":[11],"coded":[13,137],"caching.":[14,138],"The":[15,46],"wiretap":[16,128],"channel":[17,174],"II":[18],"in":[19,61,143,195],"presence":[21],"multiple":[23],"receivers":[24,78],"equipped":[25],"with":[26,149],"fixed-size":[27],"cache":[28,40],"memories,":[29],"and":[30,79,101,136],"an":[31],"adversary":[32,185],"which":[33,62,126,144,186],"selects":[34],"symbols":[35],"to":[36],"tap":[37],"from":[39],"placement":[41],"and/or":[42],"delivery":[43],"is":[44,74,98,147,169],"introduced.":[45],"legitimate":[47],"terminals":[48],"know":[49],"neither":[50],"whether":[51],"placement,":[52,153],"delivery,":[53],"or":[54],"both":[55,191],"are":[56,64,110],"tapped,":[57],"nor":[58],"positions":[60],"they":[63],"tapped.":[65],"Only":[66],"size":[68],"overall":[71,94],"tapped":[72],"set":[73],"known.":[75],"For":[76,161],"two":[77,80,118,164],"files,":[81,165],"strong":[83,106],"secrecy":[84,107],"capacity-":[85],"maximum":[87],"achievable":[88],"file":[89,108],"rate":[90,109],"while":[91],"keeping":[92],"library":[95,114],"strongly":[96],"secure-":[97],"identified.":[99],"Lower":[100],"upper":[102,141,167],"bounds":[103],"on":[104,122],"derived":[111],"when":[112],"has":[115],"more":[116,162],"than":[117,163],"files.":[119],"Achievability":[120],"relies":[121],"a":[123,183,196],"code":[124],"design":[125],"combines":[127],"coding,":[129],"security":[130,180],"embedding":[131],"codes,":[132],"one-time":[133],"pad":[134],"keys,":[135],"A":[139],"genie-aided":[140],"bound,":[142],"transmitter":[146],"provided":[148],"user":[150],"demands":[151],"before":[152],"establishes":[154],"converse":[156],"for":[157],"two-files":[159],"case.":[160],"bound":[168],"constructed":[170],"by":[171],"three":[172],"successive":[173],"transformations.":[175],"Our":[176],"results":[177],"establish":[178],"provable":[179],"guarantees":[181],"against":[182],"powerful":[184],"optimizes":[187],"its":[188],"tapping":[189],"over":[190],"phases":[192],"communication":[194],"cache-aided":[197],"system.":[198]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
