{"id":"https://openalex.org/W2050536468","doi":"https://doi.org/10.1109/netcod.2013.6570836","title":"Algorithms for weakly secure data exchange","display_name":"Algorithms for weakly secure data exchange","publication_year":2013,"publication_date":"2013-06-01","ids":{"openalex":"https://openalex.org/W2050536468","doi":"https://doi.org/10.1109/netcod.2013.6570836","mag":"2050536468"},"language":"en","primary_location":{"id":"doi:10.1109/netcod.2013.6570836","is_oa":false,"landing_page_url":"https://doi.org/10.1109/netcod.2013.6570836","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 International Symposium on Network Coding (NetCod)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064545465","display_name":"Muxi Yan","orcid":null},"institutions":[{"id":"https://openalex.org/I91045830","display_name":"Texas A&M University","ror":"https://ror.org/01f5ytq51","country_code":"US","type":"education","lineage":["https://openalex.org/I91045830"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Muxi Yan","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Texas A&M University, College Station, TX, USA","Dept. of Electr. & Comput. Eng, Texas A&M Univ., College Station, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Texas A&M University, College Station, TX, USA","institution_ids":["https://openalex.org/I91045830"]},{"raw_affiliation_string":"Dept. of Electr. & Comput. Eng, Texas A&M Univ., College Station, TX, USA","institution_ids":["https://openalex.org/I91045830"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054178465","display_name":"Alex Sprintson","orcid":"https://orcid.org/0000-0002-5768-5800"},"institutions":[{"id":"https://openalex.org/I91045830","display_name":"Texas A&M University","ror":"https://ror.org/01f5ytq51","country_code":"US","type":"education","lineage":["https://openalex.org/I91045830"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Alex Sprintson","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Texas A&M University, College Station, TX, USA","Dept. of Electr. & Comput. Eng, Texas A&M Univ., College Station, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Texas A&M University, College Station, TX, USA","institution_ids":["https://openalex.org/I91045830"]},{"raw_affiliation_string":"Dept. of Electr. & Comput. Eng, Texas A&M Univ., College Station, TX, USA","institution_ids":["https://openalex.org/I91045830"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5064545465"],"corresponding_institution_ids":["https://openalex.org/I91045830"],"apc_list":null,"apc_paid":null,"fwci":5.7993,"has_fulltext":false,"cited_by_count":43,"citation_normalized_percentile":{"value":0.96387912,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9732000231742859,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.8664159774780273},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7769744396209717},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6884510517120361},{"id":"https://openalex.org/keywords/linear-network-coding","display_name":"Linear network coding","score":0.6527100205421448},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.6173177361488342},{"id":"https://openalex.org/keywords/lossless-compression","display_name":"Lossless compression","score":0.5626857876777649},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.5511351823806763},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.5008623600006104},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.4440557062625885},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2673870921134949},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.21192380785942078},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.13694584369659424},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.124199777841568}],"concepts":[{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.8664159774780273},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7769744396209717},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6884510517120361},{"id":"https://openalex.org/C138293262","wikidata":"https://www.wikidata.org/wiki/Q1089578","display_name":"Linear network coding","level":3,"score":0.6527100205421448},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.6173177361488342},{"id":"https://openalex.org/C81081738","wikidata":"https://www.wikidata.org/wiki/Q55542","display_name":"Lossless compression","level":3,"score":0.5626857876777649},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.5511351823806763},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.5008623600006104},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.4440557062625885},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2673870921134949},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.21192380785942078},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.13694584369659424},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.124199777841568},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/netcod.2013.6570836","is_oa":false,"landing_page_url":"https://doi.org/10.1109/netcod.2013.6570836","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 International Symposium on Network Coding (NetCod)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W68293075","https://openalex.org/W1979321504","https://openalex.org/W2024301368","https://openalex.org/W2130507035","https://openalex.org/W2142398091","https://openalex.org/W2144554454","https://openalex.org/W2153984637","https://openalex.org/W2531850551","https://openalex.org/W2952170187","https://openalex.org/W3104735109","https://openalex.org/W4255270137","https://openalex.org/W6602698672","https://openalex.org/W6644938927","https://openalex.org/W6681243730","https://openalex.org/W6785762072"],"related_works":["https://openalex.org/W2258031046","https://openalex.org/W2030775967","https://openalex.org/W2755490834","https://openalex.org/W2051294371","https://openalex.org/W3125481297","https://openalex.org/W2501473353","https://openalex.org/W2963693149","https://openalex.org/W2589968180","https://openalex.org/W2064166548","https://openalex.org/W43103193"],"abstract_inverted_index":{"We":[0,189,203],"consider":[1],"the":[2,15,50,53,71,89,93,105,123,126,129,139,151,156,166,211,227],"problem":[3,24,198],"of":[4,11,17,22,28,34,46,52,153,159,214,226],"direct":[5],"data":[6],"exchange":[7],"among":[8],"a":[9,26,32,44,60,100,135,174,206,217],"group":[10],"wireless":[12],"clients":[13,58,69],"in":[14,55,70,112],"presence":[16],"an":[18,41,80,180],"eavesdropper.":[19,167],"An":[20],"instance":[21,225],"this":[23,197],"includes":[25],"set":[27,33],"packets":[29,47,54,66,75,90,125,160,186],"X":[30,113],"and":[31,48,193,199],"clients,":[35],"such":[36],"that":[37,82,103,137,161,177,182,216],"each":[38,224],"client":[39],"has":[40,183],"access":[42],"to":[43,64,67,98,133,149,172],"subset":[45],"requests":[49],"rest":[51],"X.":[56],"The":[57],"use":[59],"lossless":[61],"broadcast":[62],"channel":[63],"transmit":[65],"other":[68],"group.":[72],"All":[73],"transmitted":[74],"can":[76,162,178,221],"be":[77,163],"observed":[78],"by":[79,92,155,165],"eavesdropper":[81,106,127,140,181],"might":[83],"have":[84],"prior":[85],"side":[86],"information":[87],"about":[88],"exchanged":[91],"clients.":[94],"Our":[95],"goal":[96,170],"is":[97,132,147,171],"construct":[99,134,173],"coding":[101,175],"scheme":[102,136,176,220],"prevents":[104,138],"from":[107,141],"decoding":[108],"any":[109],"individual":[110],"packet":[111],"(beyond":[114],"those":[115],"it":[116,131,146],"already":[117],"knowns).":[118],"In":[119],"weakly":[120,218],"secure":[121,219],"schemes,":[122],"more":[124],"has,":[128],"harder":[130],"obtaining":[142],"additional":[143],"packets.":[144],"Thus,":[145],"natural":[148],"measure":[150],"degree":[152,213],"secrecy":[154,215],"maximum":[157,212],"number":[158],"held":[164],"Accordingly,":[168],"our":[169],"handle":[179],"as":[184,187],"many":[185],"possible.":[188],"also":[190,204],"present":[191],"randomized":[192],"deterministic":[194],"solutions":[195],"for":[196,223],"analyze":[200],"their":[201],"performance.":[202],"establish":[205],"tight":[207],"upper":[208],"bound":[209],"on":[210],"provide":[222],"problem.":[228]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":7},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":7},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
