{"id":"https://openalex.org/W2079429923","doi":"https://doi.org/10.1109/tifs.2015.2405897","title":"Secrecy Capacities in Space-Division Multiplexed Fiber Optic Communication Systems","display_name":"Secrecy Capacities in Space-Division Multiplexed Fiber Optic Communication Systems","publication_year":2015,"publication_date":"2015-02-24","ids":{"openalex":"https://openalex.org/W2079429923","doi":"https://doi.org/10.1109/tifs.2015.2405897","mag":"2079429923"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2015.2405897","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2015.2405897","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111470708","display_name":"Kyle Guan","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Kyle Guan","raw_affiliation_strings":["Bell Labs, Alcatel-Lucent, Holmdel, NJ, USA","Bell Laboratories\u2014Alcatel-Lucent, Holmdel, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Bell Labs, Alcatel-Lucent, Holmdel, NJ, USA","institution_ids":[]},{"raw_affiliation_string":"Bell Laboratories\u2014Alcatel-Lucent, Holmdel, NJ, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066992345","display_name":"Antonia M. Tulino","orcid":"https://orcid.org/0000-0002-6050-4150"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Antonia M. Tulino","raw_affiliation_strings":["Bell Labs, Alcatel-Lucent, Holmdel, NJ, USA","Bell Laboratories\u2014Alcatel-Lucent, Holmdel, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Bell Labs, Alcatel-Lucent, Holmdel, NJ, USA","institution_ids":[]},{"raw_affiliation_string":"Bell Laboratories\u2014Alcatel-Lucent, Holmdel, NJ, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013146659","display_name":"Peter J. Winzer","orcid":"https://orcid.org/0000-0002-6696-3884"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Peter J. Winzer","raw_affiliation_strings":["Bell Labs, Alcatel-Lucent, Holmdel, NJ, USA","Bell Laboratories\u2014Alcatel-Lucent, Holmdel, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Bell Labs, Alcatel-Lucent, Holmdel, NJ, USA","institution_ids":[]},{"raw_affiliation_string":"Bell Laboratories\u2014Alcatel-Lucent, Holmdel, NJ, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034577486","display_name":"Emina Soljanin","orcid":"https://orcid.org/0000-0002-7464-4242"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Emina Soljanin","raw_affiliation_strings":["Bell Labs, Alcatel-Lucent, Holmdel, NJ, USA","Bell Laboratories\u2014Alcatel-Lucent, Holmdel, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Bell Labs, Alcatel-Lucent, Holmdel, NJ, USA","institution_ids":[]},{"raw_affiliation_string":"Bell Laboratories\u2014Alcatel-Lucent, Holmdel, NJ, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5111470708"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.9729,"has_fulltext":false,"cited_by_count":29,"citation_normalized_percentile":{"value":0.87667466,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"10","issue":"7","first_page":"1325","last_page":"1335"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.766426682472229},{"id":"https://openalex.org/keywords/mimo","display_name":"MIMO","score":0.641852617263794},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.5917009115219116},{"id":"https://openalex.org/keywords/secure-transmission","display_name":"Secure transmission","score":0.5722013115882874},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.5544122457504272},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.536064088344574},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5278542041778564},{"id":"https://openalex.org/keywords/multiplexing","display_name":"Multiplexing","score":0.5149141550064087},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.47528377175331116},{"id":"https://openalex.org/keywords/channel-capacity","display_name":"Channel capacity","score":0.47331273555755615},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.4711543321609497},{"id":"https://openalex.org/keywords/information-theoretic-security","display_name":"Information-theoretic security","score":0.4351620674133301},{"id":"https://openalex.org/keywords/communications-system","display_name":"Communications system","score":0.4161108732223511},{"id":"https://openalex.org/keywords/electronic-engineering","display_name":"Electronic engineering","score":0.3730584383010864},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.3254479169845581},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.27357402443885803},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18390211462974548},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09176379442214966}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.766426682472229},{"id":"https://openalex.org/C207987634","wikidata":"https://www.wikidata.org/wiki/Q176862","display_name":"MIMO","level":3,"score":0.641852617263794},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.5917009115219116},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.5722013115882874},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.5544122457504272},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.536064088344574},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5278542041778564},{"id":"https://openalex.org/C19275194","wikidata":"https://www.wikidata.org/wiki/Q222903","display_name":"Multiplexing","level":2,"score":0.5149141550064087},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.47528377175331116},{"id":"https://openalex.org/C97744766","wikidata":"https://www.wikidata.org/wiki/Q870845","display_name":"Channel capacity","level":3,"score":0.47331273555755615},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.4711543321609497},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.4351620674133301},{"id":"https://openalex.org/C101765175","wikidata":"https://www.wikidata.org/wiki/Q577764","display_name":"Communications system","level":2,"score":0.4161108732223511},{"id":"https://openalex.org/C24326235","wikidata":"https://www.wikidata.org/wiki/Q126095","display_name":"Electronic engineering","level":1,"score":0.3730584383010864},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3254479169845581},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.27357402443885803},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18390211462974548},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09176379442214966}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2015.2405897","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2015.2405897","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":47,"referenced_works":["https://openalex.org/W1484690715","https://openalex.org/W1488435683","https://openalex.org/W1536209387","https://openalex.org/W1891565202","https://openalex.org/W1990371040","https://openalex.org/W2000010373","https://openalex.org/W2003410554","https://openalex.org/W2005343714","https://openalex.org/W2015412650","https://openalex.org/W2021131329","https://openalex.org/W2022220492","https://openalex.org/W2030042335","https://openalex.org/W2039852519","https://openalex.org/W2041846439","https://openalex.org/W2042353599","https://openalex.org/W2043769961","https://openalex.org/W2043995921","https://openalex.org/W2059060943","https://openalex.org/W2060574886","https://openalex.org/W2072184935","https://openalex.org/W2072563372","https://openalex.org/W2073059173","https://openalex.org/W2085689058","https://openalex.org/W2089778770","https://openalex.org/W2090798084","https://openalex.org/W2093554016","https://openalex.org/W2101726439","https://openalex.org/W2102409945","https://openalex.org/W2102654676","https://openalex.org/W2111616148","https://openalex.org/W2121213780","https://openalex.org/W2128153585","https://openalex.org/W2133377006","https://openalex.org/W2133406100","https://openalex.org/W2133475491","https://openalex.org/W2145577744","https://openalex.org/W2174057138","https://openalex.org/W2174505096","https://openalex.org/W2188191854","https://openalex.org/W2316161013","https://openalex.org/W2488138981","https://openalex.org/W2949672874","https://openalex.org/W3098014255","https://openalex.org/W3098668551","https://openalex.org/W3099356932","https://openalex.org/W6686899608","https://openalex.org/W6699598932"],"related_works":["https://openalex.org/W2765236478","https://openalex.org/W4360996312","https://openalex.org/W2529506699","https://openalex.org/W2114007974","https://openalex.org/W2150528942","https://openalex.org/W2154832352","https://openalex.org/W1483037127","https://openalex.org/W3036307543","https://openalex.org/W2460691506","https://openalex.org/W2749440377"],"abstract_inverted_index":{"Space-division":[0],"multiplexed":[1],"(SDM)":[2],"fiber":[3,19,183],"optic":[4],"transmission":[5,154],"systems":[6],"can":[7,167,185],"not":[8],"only":[9],"increase":[10],"system":[11,105,146],"capacity,":[12,79],"but":[13],"also":[14,99],"achieve":[15],"physical-layer":[16],"security":[17,29,188],"against":[18],"tapping":[20],"attacks.":[21],"In":[22,51],"this":[23],"paper,":[24],"we":[25,53,176],"examine":[26],"the":[27,37,40,45,101,109,113,118,123,148,191,194,202],"information-theoretic":[28,187],"of":[30,67,95,103,111,135,150,162,173,193,201],"optical":[31],"multiple-input-multiple-output":[32],"(MIMO)":[33],"SDM":[34,145],"by":[35,182],"evaluating":[36],"tradeoff":[38],"between":[39],"achievable":[41],"information":[42,140],"rate":[43,141,157],"and":[44,63,76,117,142],"confidentiality":[46],"for":[47,57,86],"different":[48],"channel":[49,136],"dynamics.":[50],"particular,":[52],"provide":[54],"problem":[55],"formulations":[56],"secure":[58],"communication":[59],"over":[60],"these":[61],"channels":[62],"study":[64],"three":[65],"types":[66],"secrecy":[68,125],"capacities:":[69],"1)":[70],"guaranteed":[71],"capacity;":[72,75],"2)":[73],"outage":[74],"3)":[77],"average":[78],"each":[80],"serving":[81],"as":[82,108],"a":[83,87,92,132,156],"performance":[84],"metric":[85],"coding":[88],"strategy":[89],"tailored":[90],"to":[91],"specific":[93],"type":[94],"MIMO-SDM":[96],"channel.":[97],"We":[98],"assess":[100],"impact":[102],"key":[104],"parameters,":[106],"such":[107],"number":[110],"modes,":[112],"mode-dependent":[114],"loss":[115],"(MDL),":[116],"signal-to-noise":[119],"ratio":[120],"(SNR),":[121],"on":[122],"various":[124],"capacities.":[126],"Our":[127],"results":[128],"indicate":[129],"that,":[130],"with":[131],"proper":[133],"design":[134],"codes":[137],"that":[138,158,178,200],"balance":[139],"security,":[143],"an":[144],"has":[147],"potential":[149],"offering":[151],"confidential":[152],"data":[153],"at":[155],"could":[159],"be":[160,168],"orders":[161],"magnitude":[163],"higher":[164],"than":[165,199],"what":[166],"achieved":[169],"through":[170],"other":[171],"means":[172],"encryption.":[174],"Moreover,":[175],"show":[177],"MDL,":[179],"unavoidably":[180],"induced":[181],"tapping,":[184],"allow":[186],"even":[189],"if":[190],"SNR":[192],"eavesdropper's":[195],"receiver":[196],"is":[197],"better":[198],"legitimate":[203],"receiver.":[204]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":2},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
