{"id":"https://openalex.org/W2304493364","doi":"https://doi.org/10.1109/tifs.2016.2523813","title":"Imperfect and Perfect Secrecy in Compound Multiple Access Channel With Confidential Message","display_name":"Imperfect and Perfect Secrecy in Compound Multiple Access Channel With Confidential Message","publication_year":2016,"publication_date":"2016-01-29","ids":{"openalex":"https://openalex.org/W2304493364","doi":"https://doi.org/10.1109/tifs.2016.2523813","mag":"2304493364"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2016.2523813","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2016.2523813","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055549636","display_name":"Hassan ZivariFard","orcid":"https://orcid.org/0000-0002-4218-0121"},"institutions":[{"id":"https://openalex.org/I80543232","display_name":"K.N.Toosi University of Technology","ror":"https://ror.org/0433abe34","country_code":"IR","type":"education","lineage":["https://openalex.org/I80543232"]},{"id":"https://openalex.org/I133529467","display_name":"Sharif University of Technology","ror":"https://ror.org/024c2fq17","country_code":"IR","type":"education","lineage":["https://openalex.org/I133529467"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Hassan Zivari-Fard","raw_affiliation_strings":["Department of Electrical Engineering, K. N. Toosi University of Technology, Tehran, Iran","Information Systems and Security Laboratory, Sharif University of Technology, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, K. N. Toosi University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I80543232"]},{"raw_affiliation_string":"Information Systems and Security Laboratory, Sharif University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I133529467"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028414248","display_name":"Bahareh Akhbari","orcid":"https://orcid.org/0000-0002-3199-0161"},"institutions":[{"id":"https://openalex.org/I80543232","display_name":"K.N.Toosi University of Technology","ror":"https://ror.org/0433abe34","country_code":"IR","type":"education","lineage":["https://openalex.org/I80543232"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Bahareh Akhbari","raw_affiliation_strings":["Department of Electrical Engineering, K. N. Toosi University of Technology, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, K. N. Toosi University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I80543232"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031023751","display_name":"Mahmoud Ahmadian\u2010Attari","orcid":null},"institutions":[{"id":"https://openalex.org/I80543232","display_name":"K.N.Toosi University of Technology","ror":"https://ror.org/0433abe34","country_code":"IR","type":"education","lineage":["https://openalex.org/I80543232"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Mahmoud Ahmadian-Attari","raw_affiliation_strings":["Department of Electrical Engineering, K. N. Toosi University of Technology, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, K. N. Toosi University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I80543232"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028840314","display_name":"Mohammad Reza Aref","orcid":"https://orcid.org/0000-0002-4321-0345"},"institutions":[{"id":"https://openalex.org/I133529467","display_name":"Sharif University of Technology","ror":"https://ror.org/024c2fq17","country_code":"IR","type":"education","lineage":["https://openalex.org/I133529467"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Mohammad Reza Aref","raw_affiliation_strings":["Information Systems and Security Laboratory, Sharif University of Technology, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Information Systems and Security Laboratory, Sharif University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I133529467"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5055549636"],"corresponding_institution_ids":["https://openalex.org/I133529467","https://openalex.org/I80543232"],"apc_list":null,"apc_paid":null,"fwci":0.5513,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.69444685,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"11","issue":"6","first_page":"1239","last_page":"1251"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9883999824523926,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8300954103469849},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.7938442230224609},{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.7020658254623413},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.6998070478439331},{"id":"https://openalex.org/keywords/information-theoretic-security","display_name":"Information-theoretic security","score":0.6820039749145508},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6642374992370605},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.6566561460494995},{"id":"https://openalex.org/keywords/gaussian","display_name":"Gaussian","score":0.6201314926147461},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5755115747451782},{"id":"https://openalex.org/keywords/imperfect","display_name":"Imperfect","score":0.48867538571357727},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35308724641799927},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.35119786858558655},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1221286952495575}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8300954103469849},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.7938442230224609},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.7020658254623413},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.6998070478439331},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.6820039749145508},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6642374992370605},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.6566561460494995},{"id":"https://openalex.org/C163716315","wikidata":"https://www.wikidata.org/wiki/Q901177","display_name":"Gaussian","level":2,"score":0.6201314926147461},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5755115747451782},{"id":"https://openalex.org/C2780310539","wikidata":"https://www.wikidata.org/wiki/Q12547192","display_name":"Imperfect","level":2,"score":0.48867538571357727},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35308724641799927},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.35119786858558655},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1221286952495575},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2016.2523813","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2016.2523813","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5600000023841858,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G6140397433","display_name":null,"funder_award_id":"92-32575","funder_id":"https://openalex.org/F4320322243","funder_display_name":"Iran National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320322243","display_name":"Iran National Science Foundation","ror":"https://ror.org/03sr1ma14"},{"id":"https://openalex.org/F4320324891","display_name":"Iran Telecommunication Research Center","ror":"https://ror.org/01a3g2z22"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W252932944","https://openalex.org/W949353694","https://openalex.org/W1976850008","https://openalex.org/W1977368399","https://openalex.org/W1978382377","https://openalex.org/W2017148445","https://openalex.org/W2043769961","https://openalex.org/W2079364662","https://openalex.org/W2085733085","https://openalex.org/W2089072084","https://openalex.org/W2091682073","https://openalex.org/W2099103027","https://openalex.org/W2106473863","https://openalex.org/W2115613211","https://openalex.org/W2119075493","https://openalex.org/W2127341324","https://openalex.org/W2129457795","https://openalex.org/W2130334496","https://openalex.org/W2134841917","https://openalex.org/W2144007657","https://openalex.org/W2147348113","https://openalex.org/W2156048500","https://openalex.org/W2257835695","https://openalex.org/W2542728276","https://openalex.org/W2611093107","https://openalex.org/W4300840296"],"related_works":["https://openalex.org/W2150391494","https://openalex.org/W4323970276","https://openalex.org/W2150528942","https://openalex.org/W2154832352","https://openalex.org/W1483037127","https://openalex.org/W2340481533","https://openalex.org/W2898567960","https://openalex.org/W2036210457","https://openalex.org/W2369043755","https://openalex.org/W2039752281"],"abstract_inverted_index":{"In":[0,17,129],"this":[1,18,47,58,89],"paper,":[2],"we":[3,20,60,81,111,135],"study":[4],"the":[5,25,42,50,75,93,96,108,113,132,144,149,153],"problem":[6],"of":[7,24,88,95,119],"secret":[8,40],"communication":[9],"over":[10],"a":[11,54,126],"compound":[12,51,120,123],"Multiple":[13],"Access":[14],"Channel":[15],"(MAC).":[16],"channel,":[19,90],"assume":[21],"that":[22,137],"one":[23],"transmitted":[26],"messages":[27],"is":[28,31],"confidential,":[29],"which":[30],"only":[32],"decoded":[33],"by":[34],"its":[35],"corresponding":[36],"receiver":[37],"and":[38,64,70,85,91,122,152],"kept":[39],"from":[41],"other":[43],"receiver.":[44,77,154],"We":[45],"call":[46],"proposed":[48],"setting":[49],"MAC":[52,121,124],"with":[53,125],"confidential":[55,127],"message.":[56,128],"For":[57],"model,":[59],"derive":[61],"general":[62],"inner":[63],"outer":[65],"bounds":[66],"for":[67,74,107,131],"both":[68],"imperfect":[69],"perfect":[71],"secrecy":[72,146],"conditions":[73],"second":[76],"Also,":[78],"as":[79],"examples,":[80],"investigate":[82],"less":[83],"noisy":[84],"Gaussian":[86,109,133],"versions":[87],"extend":[92],"results":[94],"discrete":[97],"memoryless":[98],"version":[99],"to":[100],"these":[101],"cases.":[102],"Moreover,":[103],"providing":[104],"numerical":[105],"examples":[106],"case,":[110,134],"illustrate":[112],"comparison":[114],"between":[115,148],"achievable":[116,145],"rate":[117,147],"regions":[118],"addition,":[130],"show":[136],"using":[138],"cooperative":[139],"jamming":[140],"strategy":[141],"can":[142],"increase":[143],"legitimate":[150],"transmitter":[151]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
