{"id":"https://openalex.org/W2016683855","doi":"https://doi.org/10.1109/tifs.2014.2346397","title":"Secure HARQ With Multiple Encoding Over Block Fading Channels: Channel Set Characterization and Outage Analysis","display_name":"Secure HARQ With Multiple Encoding Over Block Fading Channels: Channel Set Characterization and Outage Analysis","publication_year":2014,"publication_date":"2014-08-08","ids":{"openalex":"https://openalex.org/W2016683855","doi":"https://doi.org/10.1109/tifs.2014.2346397","mag":"2016683855"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2014.2346397","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2014.2346397","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076790432","display_name":"Stefano Tomasin","orcid":"https://orcid.org/0000-0003-3253-6793"},"institutions":[{"id":"https://openalex.org/I138689650","display_name":"University of Padua","ror":"https://ror.org/00240q980","country_code":"IT","type":"education","lineage":["https://openalex.org/I138689650"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Stefano Tomasin","raw_affiliation_strings":["Department of Information Engineering, University of Padua, Padua, Italy","Department of Information Engineering, University of Padua, Padua - Italy"],"affiliations":[{"raw_affiliation_string":"Department of Information Engineering, University of Padua, Padua, Italy","institution_ids":["https://openalex.org/I138689650"]},{"raw_affiliation_string":"Department of Information Engineering, University of Padua, Padua - Italy","institution_ids":["https://openalex.org/I138689650"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052660139","display_name":"Nicola Laurenti","orcid":"https://orcid.org/0000-0001-7592-1929"},"institutions":[{"id":"https://openalex.org/I138689650","display_name":"University of Padua","ror":"https://ror.org/00240q980","country_code":"IT","type":"education","lineage":["https://openalex.org/I138689650"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Nicola Laurenti","raw_affiliation_strings":["Department of Information Engineering, University of Padua, Padua, Italy","Department of Information Engineering, University of Padua, Padua - Italy"],"affiliations":[{"raw_affiliation_string":"Department of Information Engineering, University of Padua, Padua, Italy","institution_ids":["https://openalex.org/I138689650"]},{"raw_affiliation_string":"Department of Information Engineering, University of Padua, Padua - Italy","institution_ids":["https://openalex.org/I138689650"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5076790432"],"corresponding_institution_ids":["https://openalex.org/I138689650"],"apc_list":null,"apc_paid":null,"fwci":0.8373,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.76750223,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"9","issue":"10","first_page":"1708","last_page":"1719"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7315341830253601},{"id":"https://openalex.org/keywords/hybrid-automatic-repeat-request","display_name":"Hybrid automatic repeat request","score":0.5935268998146057},{"id":"https://openalex.org/keywords/code-word","display_name":"Code word","score":0.5648398399353027},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.49378952383995056},{"id":"https://openalex.org/keywords/fading","display_name":"Fading","score":0.48661574721336365},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.46622681617736816},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.453479528427124},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4534483253955841},{"id":"https://openalex.org/keywords/rayleigh-fading","display_name":"Rayleigh fading","score":0.4320194125175476},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.425489604473114},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.42310672998428345},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3464255928993225},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.23334532976150513},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.22508147358894348},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.10237807035446167}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7315341830253601},{"id":"https://openalex.org/C118437007","wikidata":"https://www.wikidata.org/wiki/Q1017139","display_name":"Hybrid automatic repeat request","level":3,"score":0.5935268998146057},{"id":"https://openalex.org/C153207627","wikidata":"https://www.wikidata.org/wiki/Q863873","display_name":"Code word","level":3,"score":0.5648398399353027},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.49378952383995056},{"id":"https://openalex.org/C81978471","wikidata":"https://www.wikidata.org/wiki/Q1196572","display_name":"Fading","level":3,"score":0.48661574721336365},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.46622681617736816},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.453479528427124},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4534483253955841},{"id":"https://openalex.org/C56985126","wikidata":"https://www.wikidata.org/wiki/Q854039","display_name":"Rayleigh fading","level":4,"score":0.4320194125175476},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.425489604473114},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.42310672998428345},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3464255928993225},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.23334532976150513},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.22508147358894348},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.10237807035446167}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tifs.2014.2346397","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2014.2346397","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:www.research.unipd.it:11577/2975903","is_oa":false,"landing_page_url":"http://hdl.handle.net/11577/2975903","pdf_url":null,"source":{"id":"https://openalex.org/S4377196283","display_name":"Research Padua  Archive (University of Padua)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I138689650","host_organization_name":"University of Padua","host_organization_lineage":["https://openalex.org/I138689650"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6800000071525574,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W949353694","https://openalex.org/W1992114448","https://openalex.org/W2037564587","https://openalex.org/W2043769961","https://openalex.org/W2055579126","https://openalex.org/W2080693943","https://openalex.org/W2095071086","https://openalex.org/W2100739124","https://openalex.org/W2110162373","https://openalex.org/W2113706820","https://openalex.org/W2117154174","https://openalex.org/W2117842133","https://openalex.org/W2128153585","https://openalex.org/W2131110609","https://openalex.org/W2144007657","https://openalex.org/W2147649897","https://openalex.org/W2156214717","https://openalex.org/W2159488583","https://openalex.org/W2159687282","https://openalex.org/W2166237723","https://openalex.org/W2172233962","https://openalex.org/W2478708596","https://openalex.org/W2542825542","https://openalex.org/W2556592912","https://openalex.org/W2949672874"],"related_works":["https://openalex.org/W2116044594","https://openalex.org/W2101999641","https://openalex.org/W1503152075","https://openalex.org/W301676527","https://openalex.org/W2052600062","https://openalex.org/W2124541664","https://openalex.org/W289296924","https://openalex.org/W2076148615","https://openalex.org/W2122920812","https://openalex.org/W2109988226"],"abstract_inverted_index":{"We":[0,163,200],"consider":[1],"a":[2,10,20,35,63,87,122,130,141,155,173],"scenario":[3],"where":[4],"agent":[5,13,23],"Alice":[6,32,70,117,124],"aims":[7],"at":[8,86],"transmitting":[9],"message":[11,74,128,153],"to":[12,54,109,183,191,240],"Bob,":[14],"while":[15,120],"keeping":[16],"it":[17,135],"secret":[18,73,112,127],"from":[19],"third":[21],"eavesdropper":[22],"Eve.":[24],"The":[25,144,225],"transmissions":[26],"occur":[27],"on":[28,41],"block-fading":[29],"channels,":[30],"and":[31,44,75,89,133,185,205,234],"only":[33],"has":[34,160],"statistical":[36],"channel":[37],"state":[38],"information":[39,189],"(CSI)":[40],"both":[42,179],"Bob":[43,93,150,184],"Eve":[45,192],"channels.":[46],"In":[47,68],"this":[48],"paper,":[49],"we":[50],"add":[51],"secrecy":[52,204],"features":[53],"hybrid":[55],"automatic":[56],"repeat":[57],"request":[58],"(HARQ)":[59],"in":[60,193],"what":[61],"becomes":[62],"secure":[64],"HARQ":[65],"(S-HARQ)":[66],"scheme.":[67],"particular,":[69],"encodes":[71],"the":[72,77,111,126,152,165,194,203,214,228,235],"splits":[76],"codeword":[78,132,233],"into":[79,129],"blocks.":[80],"Then,":[81],"she":[82],"transmits":[83,134],"one":[84],"block":[85,136],"time":[88],"after":[90],"each":[91],"transmission":[92],"feeds":[94],"back":[95],"an":[96,115],"acknowledge":[97,100],"(ACK)":[98],"(not":[99],"(NACK))":[101],"packet,":[102],"indicating":[103],"he":[104],"was":[105],"(was":[106],"not)":[107],"able":[108],"decode":[110],"message.":[113],"Upon":[114],"ACK":[116],"stops":[118],"transmission,":[119],"upon":[121],"NACK":[123],"re-encodes":[125],"new":[131,142],"by":[137],"block,":[138],"waiting":[139],"for":[140,169,213],"feedback.":[143],"process":[145],"is":[146,243],"iterated":[147],"until":[148],"either":[149],"decodes":[151],"or":[154],"maximum":[156,236],"number":[157,229,237],"of":[158,167,175,188,196,216,230,238],"codewords":[159,239],"been":[161],"transmitted.":[162],"characterize":[164],"set":[166],"channels":[168,221],"which":[170],"there":[171],"exists":[172],"sequence":[174],"codes":[176],"that":[177],"ensure":[178],"vanishing":[180,186],"error":[181],"probability":[182],"rate":[187],"leakage":[190],"limit":[195],"infinitely":[197],"long":[198],"codewords.":[199],"also":[201,244],"analyze":[202],"decodability":[206],"outage":[207],"probabilities,":[208],"providing":[209],"closed":[210],"form":[211],"expressions":[212],"case":[215],"additive":[217],"white":[218],"Gaussian":[219],"noise":[220],"with":[222],"Rayleigh":[223],"fading.":[224],"tradeoff":[226],"between":[227],"blocks":[231],"per":[232],"be":[241],"transmitted":[242],"discussed.":[245]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
