{"id":"https://openalex.org/W2063662367","doi":"https://doi.org/10.1109/tit.2013.2288256","title":"Secure Transmission of Sources Over Noisy Channels With Side Information at the Receivers","display_name":"Secure Transmission of Sources Over Noisy Channels With Side Information at the Receivers","publication_year":2013,"publication_date":"2013-11-19","ids":{"openalex":"https://openalex.org/W2063662367","doi":"https://doi.org/10.1109/tit.2013.2288256","mag":"2063662367"},"language":"en","primary_location":{"id":"doi:10.1109/tit.2013.2288256","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2013.2288256","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1201.2315","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Joffrey Villard","orcid":null},"institutions":[{"id":"https://openalex.org/I102475099","display_name":"Sup\u00e9lec","ror":"https://ror.org/00n7gwn90","country_code":"FR","type":"education","lineage":["https://openalex.org/I102475099"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Joffrey Villard","raw_affiliation_strings":["Supelec, Department of Telecommunications, Gif-sur-Yvette, France"],"affiliations":[{"raw_affiliation_string":"Supelec, Department of Telecommunications, Gif-sur-Yvette, France","institution_ids":["https://openalex.org/I102475099"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Pablo Piantanida","orcid":null},"institutions":[{"id":"https://openalex.org/I102475099","display_name":"Sup\u00e9lec","ror":"https://ror.org/00n7gwn90","country_code":"FR","type":"education","lineage":["https://openalex.org/I102475099"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Pablo Piantanida","raw_affiliation_strings":["Supelec, Department of Telecommunications, Gif-sur-Yvette, France"],"affiliations":[{"raw_affiliation_string":"Supelec, Department of Telecommunications, Gif-sur-Yvette, France","institution_ids":["https://openalex.org/I102475099"]}]},{"author_position":"last","author":{"id":null,"display_name":"Shlomo Shamai","orcid":null},"institutions":[{"id":"https://openalex.org/I174306211","display_name":"Technion \u2013 Israel Institute of Technology","ror":"https://ror.org/03qryx823","country_code":"IL","type":"education","lineage":["https://openalex.org/I174306211"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Shlomo Shamai","raw_affiliation_strings":["Department of Electrical Engineering, Technion, Israel Institute of Technology, Haifa, Israel"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Technion, Israel Institute of Technology, Haifa, Israel","institution_ids":["https://openalex.org/I174306211"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I102475099"],"apc_list":null,"apc_paid":null,"fwci":2.4038,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.89763621,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"60","issue":"1","first_page":"713","last_page":"739"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10148","display_name":"Advanced MIMO Systems Optimization","score":0.00019999999494757503,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.00019999999494757503,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encoder","display_name":"Encoder","score":0.5974000096321106},{"id":"https://openalex.org/keywords/gaussian","display_name":"Gaussian","score":0.5133000016212463},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.5055999755859375},{"id":"https://openalex.org/keywords/counterexample","display_name":"Counterexample","score":0.47749999165534973},{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.46619999408721924},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.453900009393692},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4528000056743622},{"id":"https://openalex.org/keywords/quadratic-equation","display_name":"Quadratic equation","score":0.439300000667572},{"id":"https://openalex.org/keywords/dirty-paper-coding","display_name":"Dirty paper coding","score":0.43140000104904175}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6280999779701233},{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.5974000096321106},{"id":"https://openalex.org/C163716315","wikidata":"https://www.wikidata.org/wiki/Q901177","display_name":"Gaussian","level":2,"score":0.5133000016212463},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.5055999755859375},{"id":"https://openalex.org/C162838799","wikidata":"https://www.wikidata.org/wiki/Q596077","display_name":"Counterexample","level":2,"score":0.47749999165534973},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.476500004529953},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.46619999408721924},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.453900009393692},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4528000056743622},{"id":"https://openalex.org/C129844170","wikidata":"https://www.wikidata.org/wiki/Q41299","display_name":"Quadratic equation","level":2,"score":0.439300000667572},{"id":"https://openalex.org/C2780186295","wikidata":"https://www.wikidata.org/wiki/Q3305007","display_name":"Dirty paper coding","level":5,"score":0.43140000104904175},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.4154999852180481},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.41339999437332153},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.40700000524520874},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.3853999972343445},{"id":"https://openalex.org/C126780896","wikidata":"https://www.wikidata.org/wiki/Q899871","display_name":"Distortion (music)","level":4,"score":0.3702000081539154},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.3666999936103821},{"id":"https://openalex.org/C52622258","wikidata":"https://www.wikidata.org/wiki/Q131222","display_name":"Information theory","level":2,"score":0.34139999747276306},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.31619998812675476},{"id":"https://openalex.org/C22676131","wikidata":"https://www.wikidata.org/wiki/Q4751065","display_name":"Analog transmission","level":4,"score":0.30660000443458557},{"id":"https://openalex.org/C169334058","wikidata":"https://www.wikidata.org/wiki/Q353292","display_name":"Additive white Gaussian noise","level":3,"score":0.28529998660087585},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.27379998564720154},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.26930001378059387},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2689000070095062},{"id":"https://openalex.org/C4199805","wikidata":"https://www.wikidata.org/wiki/Q2725903","display_name":"Gaussian noise","level":2,"score":0.2644999921321869},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.2624000012874603},{"id":"https://openalex.org/C28855332","wikidata":"https://www.wikidata.org/wiki/Q198099","display_name":"Quantization (signal processing)","level":2,"score":0.2614000141620636},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.2583000063896179},{"id":"https://openalex.org/C97744766","wikidata":"https://www.wikidata.org/wiki/Q870845","display_name":"Channel capacity","level":3,"score":0.25600001215934753}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tit.2013.2288256","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2013.2288256","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:1201.2315","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1201.2315","pdf_url":"https://arxiv.org/pdf/1201.2315","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:HAL:hal-00907661v1","is_oa":false,"landing_page_url":"https://centralesupelec.hal.science/hal-00907661","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Transactions on Information Theory, 2014, 60 (1), pp.713 - 739. &#x27E8;10.1109/TIT.2013.2288256&#x27E9;","raw_type":"Journal articles"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1201.2315","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1201.2315","pdf_url":"https://arxiv.org/pdf/1201.2315","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W52732363","https://openalex.org/W1976109068","https://openalex.org/W1978070031","https://openalex.org/W1990454590","https://openalex.org/W1997140351","https://openalex.org/W2015365039","https://openalex.org/W2021380203","https://openalex.org/W2043769961","https://openalex.org/W2049651362","https://openalex.org/W2071836449","https://openalex.org/W2097359282","https://openalex.org/W2099213070","https://openalex.org/W2103921855","https://openalex.org/W2109394932","https://openalex.org/W2112225430","https://openalex.org/W2119985618","https://openalex.org/W2126496914","https://openalex.org/W2126654067","https://openalex.org/W2129504043","https://openalex.org/W2129885443","https://openalex.org/W2129977719","https://openalex.org/W2135541923","https://openalex.org/W2143075689","https://openalex.org/W2144007657","https://openalex.org/W2148164553","https://openalex.org/W2150412388","https://openalex.org/W2156826559","https://openalex.org/W2159687282","https://openalex.org/W2165258662","https://openalex.org/W2168457389","https://openalex.org/W2570976712","https://openalex.org/W2993383518","https://openalex.org/W3140053156","https://openalex.org/W4300840296"],"related_works":[],"abstract_inverted_index":{"This":[0,19,77],"paper":[1],"investigates":[2],"the":[3,57,61,67,71,86,97,100,108,170,193,205,216,243,250,253,257],"problem":[4],"of":[5,22,85,88,135,195,245,267],"source-channel":[6],"coding":[7,91],"for":[8,125],"secure":[9,89],"transmission":[10],"with":[11,92,159],"arbitrarily":[12],"correlated":[13],"side":[14,94,129,210,251],"informations":[15],"at":[16,64,70,96,215,259],"both":[17,196,228],"receivers.":[18],"scenario":[20],"consists":[21],"an":[23,114,240],"encoder":[24],"(referred":[25,46,73],"to":[26,31,42,47,74,177,191,222],"as":[27,48,75,82,111,113],"Alice)":[28],"that":[29,140,147,163,189],"wishes":[30],"compress":[32],"a":[33,39,43,83,119,156,160,164,184],"source":[34,90,162],"and":[35,66,99,128,146,180,198,230,233,256],"send":[36],"it":[37,137,151,226],"through":[38,155],"noisy":[40],"channel":[41,254],"legitimate":[44],"receiver":[45],"Bob).":[49],"In":[50,131,204],"this":[51,141,218],"context,":[52],"Alice":[53],"must":[54],"simultaneously":[55],"satisfy":[56],"desired":[58],"requirements":[59],"on":[60,107,118],"distortion":[62,258],"level":[63],"Bob":[65,260],"equivocation":[68],"rate":[69],"eavesdropper":[72],"Eve).":[76],"setting":[78],"can":[79,168,261],"be":[80,223,235,262],"seen":[81],"generalization":[84],"problems":[87],"(uncoded)":[93],"information":[95,211],"decoders":[98],"wiretap":[101],"channel.":[102],"A":[103],"general":[104],"outer":[105],"bound":[106,116],"rate-distortion-equivocation":[109],"region,":[110],"well":[112],"inner":[115],"based":[117],"pure":[120,165],"digital":[121,142,171,197,229],"scheme,":[122],"is":[123,138,144,152,201,212,220],"derived":[124],"arbitrary":[126],"channels":[127],"informations.":[130],"some":[132],"special":[133],"cases":[134],"interest,":[136],"proved":[139,221],"scheme":[143,167,188],"optimal":[145],"separation":[148],"holds.":[149],"However,":[150],"also":[153],"shown":[154],"simple":[157],"counterexample":[158],"binary":[161],"analog":[166,199,231],"outperform":[169],"one":[172],"while":[173],"being":[174],"optimal.":[175,224],"According":[176],"these":[178],"observations":[179],"assuming":[181],"matched":[182],"bandwidth,":[183],"novel":[185],"hybrid":[186],"digital/analog":[187],"aims":[190],"gather":[192],"advantages":[194],"ones":[200],"then":[202],"presented.":[203],"quadratic":[206],"Gaussian":[207],"setup":[208],"when":[209],"only":[213],"present":[214],"eavesdropper,":[217],"strategy":[219],"Furthermore,":[225],"outperforms":[227],"schemes":[232],"cannot":[234],"achieved":[236],"via":[237],"time-sharing.":[238],"Through":[239],"appropriate":[241],"coding,":[242],"presence":[244],"any":[246],"statistical":[247],"difference":[248],"among":[249],"informations,":[252],"noises,":[255],"fully":[263],"exploited":[264],"in":[265],"terms":[266],"secrecy.":[268]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":4}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2016-06-24T00:00:00"}
