{"id":"https://openalex.org/W2963095619","doi":"https://doi.org/10.1109/tifs.2018.2868538","title":"Physical Layer Security for RF Satellite Channels in the Finite-Length Regime","display_name":"Physical Layer Security for RF Satellite Channels in the Finite-Length Regime","publication_year":2018,"publication_date":"2018-09-04","ids":{"openalex":"https://openalex.org/W2963095619","doi":"https://doi.org/10.1109/tifs.2018.2868538","mag":"2963095619"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2018.2868538","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2018.2868538","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090804957","display_name":"M. A. V\u00e1zquez\u2010Castro","orcid":"https://orcid.org/0000-0002-6292-7149"},"institutions":[{"id":"https://openalex.org/I123044942","display_name":"Universitat Aut\u00f2noma de Barcelona","ror":"https://ror.org/052g8jq94","country_code":"ES","type":"education","lineage":["https://openalex.org/I123044942"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"Angeles Vazquez-Castro","raw_affiliation_strings":["Department of Telecommunications and Systems Engineering, Autonomous University of Barcelona, Barcelona, Spain"],"affiliations":[{"raw_affiliation_string":"Department of Telecommunications and Systems Engineering, Autonomous University of Barcelona, Barcelona, Spain","institution_ids":["https://openalex.org/I123044942"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024634142","display_name":"Masahito Hayashi","orcid":"https://orcid.org/0000-0003-3104-1000"},"institutions":[{"id":"https://openalex.org/I60134161","display_name":"Nagoya University","ror":"https://ror.org/04chrp450","country_code":"JP","type":"education","lineage":["https://openalex.org/I60134161"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Masahito Hayashi","raw_affiliation_strings":["Graduate School of Mathematics, Nagoya University, Nagoya, Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Mathematics, Nagoya University, Nagoya, Japan","institution_ids":["https://openalex.org/I60134161"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5090804957"],"corresponding_institution_ids":["https://openalex.org/I123044942"],"apc_list":null,"apc_paid":null,"fwci":2.4463,"has_fulltext":false,"cited_by_count":33,"citation_normalized_percentile":{"value":0.90003805,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"14","issue":"4","first_page":"981","last_page":"993"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7860485911369324},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.5870105028152466},{"id":"https://openalex.org/keywords/information-theoretic-security","display_name":"Information-theoretic security","score":0.5612810254096985},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.5504695177078247},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5130966901779175},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.42628800868988037},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.36934176087379456},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3401954770088196},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.3396490216255188},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3301469683647156},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.27608227729797363},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.163571298122406}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7860485911369324},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.5870105028152466},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.5612810254096985},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.5504695177078247},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5130966901779175},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.42628800868988037},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.36934176087379456},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3401954770088196},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.3396490216255188},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3301469683647156},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.27608227729797363},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.163571298122406},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2018.2868538","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2018.2868538","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17","score":0.4399999976158142}],"awards":[],"funders":[{"id":"https://openalex.org/F4320315724","display_name":"Kayamori Foundation of Informational Science Advancement","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":90,"referenced_works":["https://openalex.org/W10654113","https://openalex.org/W121170856","https://openalex.org/W182801106","https://openalex.org/W252932944","https://openalex.org/W949353694","https://openalex.org/W1514518704","https://openalex.org/W1536930200","https://openalex.org/W1553965766","https://openalex.org/W1626000505","https://openalex.org/W1796539907","https://openalex.org/W1848093774","https://openalex.org/W1909910312","https://openalex.org/W1955330666","https://openalex.org/W1966062126","https://openalex.org/W1985623009","https://openalex.org/W1986090422","https://openalex.org/W1989008275","https://openalex.org/W1995468345","https://openalex.org/W1998544344","https://openalex.org/W2002283824","https://openalex.org/W2006743106","https://openalex.org/W2007529001","https://openalex.org/W2018056464","https://openalex.org/W2018877773","https://openalex.org/W2019280506","https://openalex.org/W2043769961","https://openalex.org/W2058461447","https://openalex.org/W2060644465","https://openalex.org/W2070288478","https://openalex.org/W2080693943","https://openalex.org/W2098538375","https://openalex.org/W2101155862","https://openalex.org/W2102654676","https://openalex.org/W2103674915","https://openalex.org/W2104562009","https://openalex.org/W2106833918","https://openalex.org/W2109394932","https://openalex.org/W2112967760","https://openalex.org/W2116014628","https://openalex.org/W2117842133","https://openalex.org/W2124602541","https://openalex.org/W2126442133","https://openalex.org/W2128153585","https://openalex.org/W2128482304","https://openalex.org/W2133406100","https://openalex.org/W2139585798","https://openalex.org/W2142901448","https://openalex.org/W2144007657","https://openalex.org/W2145577744","https://openalex.org/W2147134542","https://openalex.org/W2148587342","https://openalex.org/W2155438308","https://openalex.org/W2156214717","https://openalex.org/W2156690269","https://openalex.org/W2159687282","https://openalex.org/W2164882051","https://openalex.org/W2166221619","https://openalex.org/W2211831180","https://openalex.org/W2220305334","https://openalex.org/W2294422857","https://openalex.org/W2329864590","https://openalex.org/W2336027789","https://openalex.org/W2478708596","https://openalex.org/W2557431413","https://openalex.org/W2611093107","https://openalex.org/W2763740675","https://openalex.org/W2767438951","https://openalex.org/W2914714618","https://openalex.org/W2949672874","https://openalex.org/W2951460181","https://openalex.org/W2962945961","https://openalex.org/W2963370772","https://openalex.org/W2963806987","https://openalex.org/W2964220689","https://openalex.org/W2987687226","https://openalex.org/W3006184585","https://openalex.org/W3101171379","https://openalex.org/W3101381962","https://openalex.org/W3103396173","https://openalex.org/W3103409729","https://openalex.org/W3104341411","https://openalex.org/W3105664297","https://openalex.org/W3123299285","https://openalex.org/W4210300416","https://openalex.org/W4231270807","https://openalex.org/W4301176732","https://openalex.org/W6600458655","https://openalex.org/W6607508979","https://openalex.org/W6654347880","https://openalex.org/W6668024936"],"related_works":["https://openalex.org/W4225831761","https://openalex.org/W2963370772","https://openalex.org/W3101700108","https://openalex.org/W2102378925","https://openalex.org/W2963392197","https://openalex.org/W2573616935","https://openalex.org/W2240493303","https://openalex.org/W2922231077","https://openalex.org/W4220814770","https://openalex.org/W886176270"],"abstract_inverted_index":{"Secure":[0],"communications":[1],"are":[2,54],"becoming":[3],"increasingly":[4],"relevant":[5],"in":[6,17,242],"the":[7,28,73,98,127,151,156,169,189,193,218],"development":[8],"of":[9,75,171,192,213,217,245],"space":[10],"technology.":[11],"Well-established":[12],"cryptographic":[13],"technology":[14],"is":[15,20,88,120,131],"already":[16],"place":[18],"and":[19,60,64,116,177],"expected":[21],"to":[22,24,40,47,162,202,205],"continue":[23],"be":[25,203],"so.":[26],"On":[27],"other":[29],"hand,":[30],"information":[31,216],"theoretical":[32],"security":[33,43],"emerges":[34],"as":[35,186],"a":[36,93,104,141,159,172],"post-quantum":[37],"versatile":[38],"candidate":[39],"complement":[41],"overall":[42,194],"strength.":[44],"In":[45,68,181],"order":[46],"prove":[48],"such":[49],"potential,":[50],"performance":[51,179],"analysis":[52],"methods":[53],"needed":[55],"that":[56,133,149,200],"consider":[57],"realistic":[58,83],"legitimate":[59,157],"eavesdropper":[61],"system":[62,84],"assumptions":[63,223],"non-asymptotic":[65],"coding":[66,195],"lengths.":[67],"this":[69],"paper,":[70],"we":[71,91,139,167,184],"propose":[72,92],"design":[74,170,232],"secure":[76,164,173],"radio":[77],"frequency":[78],"(RF)":[79],"satellite":[80,145,174,246],"links":[81],"with":[82,122,234],"assumptions.":[85],"Our":[86,207],"contribution":[87],"three-fold.":[89],"First,":[90],"wiretap":[94,106,146],"channel":[95,147,154,214],"model":[96,102,148],"for":[97,125,198],"finite-length":[99,128,178],"regime.":[100],"The":[101],"includes":[103],"stochastic":[105,152],"encoding":[107],"method":[108,233],"using":[109,237],"existing":[110],"practical":[111,238],"linear":[112],"error":[113,239],"correcting":[114,240],"codes":[115,241],"hash":[117],"codes.":[118],"Secrecy":[119],"provided":[121],"privacy":[123],"amplification,":[124],"which":[126],"secrecy":[129],"metric":[130],"given":[132],"upper":[134],"bounds":[135],"semantic":[136],"secrecy.":[137,206],"Second,":[138],"derive":[140],"novel":[142],"RF":[143],"(broadcast)":[144],"parameterizes":[150],"degraded":[153],"around":[155],"channel,":[158],"necessary":[160],"condition":[161],"enable":[163],"communication.":[165,247],"Finally,":[166],"show":[168],"physical":[175],"layer":[176],"evaluation.":[180],"doing":[182],"so,":[183],"define":[185],"sacrifice":[187],"rate":[188,196],"fixed":[190],"fraction":[191],"budget":[197],"reliability":[199],"needs":[201],"allocated":[204],"methodology":[208],"does":[209],"not":[210],"make":[211],"use":[212],"side":[215],"eavesdropper,":[219],"it":[220],"only":[221],"makes":[222],"on":[224],"Eve's":[225],"noise":[226],"power.":[227],"We":[228],"illustrate":[229],"our":[230],"proposed":[231],"numerical":[235],"results":[236],"current":[243],"standards":[244]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
