{"id":"https://openalex.org/W2055579126","doi":"https://doi.org/10.1109/tit.2013.2265691","title":"Secrecy Outage Capacity of Fading Channels","display_name":"Secrecy Outage Capacity of Fading Channels","publication_year":2013,"publication_date":"2013-08-01","ids":{"openalex":"https://openalex.org/W2055579126","doi":"https://doi.org/10.1109/tit.2013.2265691","mag":"2055579126"},"language":"en","primary_location":{"id":"doi:10.1109/tit.2013.2265691","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2013.2265691","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103267293","display_name":"Onur G\u00fcng\u00f6r","orcid":"https://orcid.org/0000-0002-1605-3495"},"institutions":[{"id":"https://openalex.org/I52357470","display_name":"The Ohio State University","ror":"https://ror.org/00rs6vg23","country_code":"US","type":"education","lineage":["https://openalex.org/I52357470"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Onur Gungor","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Ohio State University, Columbus, OH, USA","Dept. of Electr. & Comput. Eng., Ohio state Univ., Columbus, OH, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Ohio State University, Columbus, OH, USA","institution_ids":["https://openalex.org/I52357470"]},{"raw_affiliation_string":"Dept. of Electr. & Comput. Eng., Ohio state Univ., Columbus, OH, USA","institution_ids":["https://openalex.org/I52357470"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101812238","display_name":"Jian Tan","orcid":"https://orcid.org/0000-0002-1080-9300"},"institutions":[{"id":"https://openalex.org/I1341412227","display_name":"IBM (United States)","ror":"https://ror.org/05hh8d621","country_code":"US","type":"company","lineage":["https://openalex.org/I1341412227"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jian Tan","raw_affiliation_strings":["IBM T.J. Watson Research Center, Hawthorne, NY, USA"],"affiliations":[{"raw_affiliation_string":"IBM T.J. Watson Research Center, Hawthorne, NY, USA","institution_ids":["https://openalex.org/I1341412227"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030047891","display_name":"C. Emre Koksal","orcid":"https://orcid.org/0000-0001-8463-4446"},"institutions":[{"id":"https://openalex.org/I52357470","display_name":"The Ohio State University","ror":"https://ror.org/00rs6vg23","country_code":"US","type":"education","lineage":["https://openalex.org/I52357470"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Can Emre Koksal","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Ohio State University, Columbus, OH, USA","Dept. of Electr. & Comput. Eng., Ohio state Univ., Columbus, OH, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Ohio State University, Columbus, OH, USA","institution_ids":["https://openalex.org/I52357470"]},{"raw_affiliation_string":"Dept. of Electr. & Comput. Eng., Ohio state Univ., Columbus, OH, USA","institution_ids":["https://openalex.org/I52357470"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110237798","display_name":"Hesham El-Gamal","orcid":null},"institutions":[{"id":"https://openalex.org/I52357470","display_name":"The Ohio State University","ror":"https://ror.org/00rs6vg23","country_code":"US","type":"education","lineage":["https://openalex.org/I52357470"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hesham El-Gamal","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Ohio State University, Columbus, OH, USA","Dept. of Electr. & Comput. Eng., Ohio state Univ., Columbus, OH, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Ohio State University, Columbus, OH, USA","institution_ids":["https://openalex.org/I52357470"]},{"raw_affiliation_string":"Dept. of Electr. & Comput. Eng., Ohio state Univ., Columbus, OH, USA","institution_ids":["https://openalex.org/I52357470"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035752536","display_name":"Ness B. Shroff","orcid":"https://orcid.org/0000-0002-4606-6879"},"institutions":[{"id":"https://openalex.org/I52357470","display_name":"The Ohio State University","ror":"https://ror.org/00rs6vg23","country_code":"US","type":"education","lineage":["https://openalex.org/I52357470"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ness B. Shroff","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Ohio State University, Columbus, OH, USA","Dept. of Electr. & Comput. Eng., Ohio state Univ., Columbus, OH, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Ohio State University, Columbus, OH, USA","institution_ids":["https://openalex.org/I52357470"]},{"raw_affiliation_string":"Dept. of Electr. & Comput. Eng., Ohio state Univ., Columbus, OH, USA","institution_ids":["https://openalex.org/I52357470"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5103267293"],"corresponding_institution_ids":["https://openalex.org/I52357470"],"apc_list":null,"apc_paid":null,"fwci":6.857,"has_fulltext":false,"cited_by_count":65,"citation_normalized_percentile":{"value":0.97235369,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"59","issue":"9","first_page":"5379","last_page":"5397"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10148","display_name":"Advanced MIMO Systems Optimization","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.8005660772323608},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.7953783869743347},{"id":"https://openalex.org/keywords/fading","display_name":"Fading","score":0.736962616443634},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6962363123893738},{"id":"https://openalex.org/keywords/channel-state-information","display_name":"Channel state information","score":0.675204336643219},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.6274749636650085},{"id":"https://openalex.org/keywords/information-theoretic-security","display_name":"Information-theoretic security","score":0.6012775897979736},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5778285264968872},{"id":"https://openalex.org/keywords/channel-capacity","display_name":"Channel capacity","score":0.5108301639556885},{"id":"https://openalex.org/keywords/constraint","display_name":"Constraint (computer-aided design)","score":0.502947986125946},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4766424596309662},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32712817192077637},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.3188514709472656},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.28718042373657227},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.19796723127365112}],"concepts":[{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.8005660772323608},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.7953783869743347},{"id":"https://openalex.org/C81978471","wikidata":"https://www.wikidata.org/wiki/Q1196572","display_name":"Fading","level":3,"score":0.736962616443634},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6962363123893738},{"id":"https://openalex.org/C148063708","wikidata":"https://www.wikidata.org/wiki/Q5072511","display_name":"Channel state information","level":3,"score":0.675204336643219},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.6274749636650085},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.6012775897979736},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5778285264968872},{"id":"https://openalex.org/C97744766","wikidata":"https://www.wikidata.org/wiki/Q870845","display_name":"Channel capacity","level":3,"score":0.5108301639556885},{"id":"https://openalex.org/C2776036281","wikidata":"https://www.wikidata.org/wiki/Q48769818","display_name":"Constraint (computer-aided design)","level":2,"score":0.502947986125946},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4766424596309662},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32712817192077637},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.3188514709472656},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.28718042373657227},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.19796723127365112},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tit.2013.2265691","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2013.2265691","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7300000190734863,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1501327657","https://openalex.org/W2012077155","https://openalex.org/W2043769961","https://openalex.org/W2080693943","https://openalex.org/W2084843810","https://openalex.org/W2095071086","https://openalex.org/W2109394932","https://openalex.org/W2110762757","https://openalex.org/W2112955560","https://openalex.org/W2128153585","https://openalex.org/W2153465692","https://openalex.org/W2154300278","https://openalex.org/W2156214717","https://openalex.org/W2159687282","https://openalex.org/W2164818067","https://openalex.org/W2172233962","https://openalex.org/W2478708596","https://openalex.org/W2516950796","https://openalex.org/W4302856910","https://openalex.org/W6674126310"],"related_works":["https://openalex.org/W1931943713","https://openalex.org/W4313886786","https://openalex.org/W301676527","https://openalex.org/W2103028776","https://openalex.org/W3140554627","https://openalex.org/W1757854673","https://openalex.org/W2991224564","https://openalex.org/W4289865786","https://openalex.org/W2172055400","https://openalex.org/W2507345605"],"abstract_inverted_index":{"This":[0],"paper":[1],"considers":[2],"point-to-point":[3],"secure":[4,99],"communication":[5],"over":[6],"flat":[7],"fading":[8],"channels":[9],"under":[10,38],"an":[11],"outage":[12,21,53,187],"constraint.":[13],"More":[14],"specifically,":[15],"we":[16,50,150,176],"extend":[17,112],"the":[18,26,34,43,52,58,64,73,84,104,116,121,128,147,153,171,178,185],"definition":[19],"of":[20,33,63,167,180],"capacity":[22,55,74],"to":[23,98,115,125,141,162],"account":[24],"for":[25],"secrecy":[27,54],"constraint":[28],"and":[29,66,95,170],"obtain":[30],"sharp":[31],"characterizations":[32],"corresponding":[35],"fundamental":[36],"limits":[37],"two":[39,148],"different":[40],"assumptions":[41],"on":[42,78,137,184],"transmitter":[44,59,122],"channel":[45,68,130,168],"state":[46],"information":[47],"(CSI).":[48],"First,":[49],"find":[51],"assuming":[56],"that":[57],"has":[60],"perfect":[61],"knowledge":[62],"legitimate":[65,85,129],"eavesdropper":[67],"gains.":[69],"In":[70,146],"this":[71],"scenario,":[72],"achieving":[75],"scheme":[76],"relies":[77],"opportunistically":[79],"exchanging":[80],"private":[81],"keys":[82,88],"between":[83],"nodes.":[86],"These":[87],"are":[89],"stored":[90],"in":[91],"a":[92,164],"key":[93,144,181],"buffer":[94,182],"later":[96],"used":[97],"delay":[100],"sensitive":[101],"data":[102],"using":[103],"Vernam's":[105],"one":[106],"time":[107],"pad":[108],"technique.":[109],"We":[110],"then":[111],"our":[113,133],"results":[114],"more":[117],"practical":[118],"scenario":[119],"where":[120],"is":[123],"assumed":[124],"know":[126],"only":[127],"gain.":[131],"Here,":[132],"achievability":[134],"arguments":[135],"rely":[136],"privacy":[138],"amplification":[139],"techniques":[140],"generate":[142],"secret":[143],"bits.":[145],"cases,":[149],"also":[151],"characterize":[152],"optimal":[154,172],"power":[155],"control":[156],"policies":[157],"which,":[158],"interestingly,":[159],"turn":[160],"out":[161],"be":[163],"judicious":[165],"combination":[166],"inversion":[169],"ergodic":[173],"strategy.":[174],"Finally,":[175],"analyze":[177],"effect":[179],"overflow":[183],"overall":[186],"probability.":[188]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":5},{"year":2017,"cited_by_count":6},{"year":2016,"cited_by_count":6},{"year":2015,"cited_by_count":13},{"year":2014,"cited_by_count":6},{"year":2013,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
