{"id":"https://openalex.org/W2982339296","doi":"https://doi.org/10.1109/wcnc.2019.8885583","title":"Delay Optimal Coding for Secure Transmission over a Burst Erasure Wiretap Channel","display_name":"Delay Optimal Coding for Secure Transmission over a Burst Erasure Wiretap Channel","publication_year":2019,"publication_date":"2019-04-01","ids":{"openalex":"https://openalex.org/W2982339296","doi":"https://doi.org/10.1109/wcnc.2019.8885583","mag":"2982339296"},"language":"en","primary_location":{"id":"doi:10.1109/wcnc.2019.8885583","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc.2019.8885583","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005059948","display_name":"Anna Frank","orcid":null},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Anna Frank","raw_affiliation_strings":["Lehrstuhl f\u00fcr Theoretische Informationstechnik Technische, Universit\u00e4t M\u00fcnchen"],"affiliations":[{"raw_affiliation_string":"Lehrstuhl f\u00fcr Theoretische Informationstechnik Technische, Universit\u00e4t M\u00fcnchen","institution_ids":["https://openalex.org/I62916508"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109952473","display_name":"Harout Aydinian","orcid":null},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Harout Aydinian","raw_affiliation_strings":["Lehrstuhl f\u00fcr Theoretische Informationstechnik Technische, Universit\u00e4t M\u00fcnchen"],"affiliations":[{"raw_affiliation_string":"Lehrstuhl f\u00fcr Theoretische Informationstechnik Technische, Universit\u00e4t M\u00fcnchen","institution_ids":["https://openalex.org/I62916508"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000732219","display_name":"Holger Boche","orcid":"https://orcid.org/0000-0002-8375-8946"},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Holger Boche","raw_affiliation_strings":["Lehrstuhl f\u00fcr Theoretische Informationstechnik Technische, Universit\u00e4t M\u00fcnchen"],"affiliations":[{"raw_affiliation_string":"Lehrstuhl f\u00fcr Theoretische Informationstechnik Technische, Universit\u00e4t M\u00fcnchen","institution_ids":["https://openalex.org/I62916508"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5005059948"],"corresponding_institution_ids":["https://openalex.org/I62916508"],"apc_list":null,"apc_paid":null,"fwci":0.1768,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.55142484,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7121070623397827},{"id":"https://openalex.org/keywords/erasure","display_name":"Erasure","score":0.6614527702331543},{"id":"https://openalex.org/keywords/information-theoretic-security","display_name":"Information-theoretic security","score":0.6320075988769531},{"id":"https://openalex.org/keywords/erasure-code","display_name":"Erasure code","score":0.6289414763450623},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.6095050573348999},{"id":"https://openalex.org/keywords/binary-erasure-channel","display_name":"Binary erasure channel","score":0.5512177348136902},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.5465112328529358},{"id":"https://openalex.org/keywords/online-codes","display_name":"Online codes","score":0.5393350720405579},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.5345000624656677},{"id":"https://openalex.org/keywords/block-code","display_name":"Block code","score":0.49070632457733154},{"id":"https://openalex.org/keywords/luby-transform-code","display_name":"Luby transform code","score":0.4907010793685913},{"id":"https://openalex.org/keywords/fountain-code","display_name":"Fountain code","score":0.48945701122283936},{"id":"https://openalex.org/keywords/tornado-code","display_name":"Tornado code","score":0.46009132266044617},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.45549827814102173},{"id":"https://openalex.org/keywords/block-size","display_name":"Block size","score":0.4439904987812042},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4055023193359375},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.38861939311027527},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3210363984107971},{"id":"https://openalex.org/keywords/concatenated-error-correction-code","display_name":"Concatenated error correction code","score":0.29550662636756897},{"id":"https://openalex.org/keywords/channel-capacity","display_name":"Channel capacity","score":0.20759975910186768},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.17983585596084595},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1775481104850769},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.13732510805130005}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7121070623397827},{"id":"https://openalex.org/C2778790127","wikidata":"https://www.wikidata.org/wiki/Q484885","display_name":"Erasure","level":2,"score":0.6614527702331543},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.6320075988769531},{"id":"https://openalex.org/C137529215","wikidata":"https://www.wikidata.org/wiki/Q5385031","display_name":"Erasure code","level":3,"score":0.6289414763450623},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.6095050573348999},{"id":"https://openalex.org/C149862233","wikidata":"https://www.wikidata.org/wiki/Q864142","display_name":"Binary erasure channel","level":4,"score":0.5512177348136902},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.5465112328529358},{"id":"https://openalex.org/C103093684","wikidata":"https://www.wikidata.org/wiki/Q7094069","display_name":"Online codes","level":5,"score":0.5393350720405579},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.5345000624656677},{"id":"https://openalex.org/C157125643","wikidata":"https://www.wikidata.org/wiki/Q884707","display_name":"Block code","level":3,"score":0.49070632457733154},{"id":"https://openalex.org/C128151799","wikidata":"https://www.wikidata.org/wiki/Q13563306","display_name":"Luby transform code","level":5,"score":0.4907010793685913},{"id":"https://openalex.org/C76132124","wikidata":"https://www.wikidata.org/wiki/Q5474786","display_name":"Fountain code","level":5,"score":0.48945701122283936},{"id":"https://openalex.org/C65058987","wikidata":"https://www.wikidata.org/wiki/Q7826005","display_name":"Tornado code","level":5,"score":0.46009132266044617},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.45549827814102173},{"id":"https://openalex.org/C41431624","wikidata":"https://www.wikidata.org/wiki/Q1053357","display_name":"Block size","level":3,"score":0.4439904987812042},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4055023193359375},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.38861939311027527},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3210363984107971},{"id":"https://openalex.org/C78944582","wikidata":"https://www.wikidata.org/wiki/Q5158264","display_name":"Concatenated error correction code","level":4,"score":0.29550662636756897},{"id":"https://openalex.org/C97744766","wikidata":"https://www.wikidata.org/wiki/Q870845","display_name":"Channel capacity","level":3,"score":0.20759975910186768},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.17983585596084595},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1775481104850769},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.13732510805130005},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wcnc.2019.8885583","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc.2019.8885583","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6000000238418579}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1512713022","https://openalex.org/W1590749237","https://openalex.org/W1968974808","https://openalex.org/W2049418428","https://openalex.org/W2066422082","https://openalex.org/W2113967464","https://openalex.org/W2125921054","https://openalex.org/W2130150152","https://openalex.org/W2143241245","https://openalex.org/W2161536533","https://openalex.org/W2162789499","https://openalex.org/W2168883560","https://openalex.org/W2511634635","https://openalex.org/W2540504585","https://openalex.org/W2586580216","https://openalex.org/W2913533115","https://openalex.org/W2914714618","https://openalex.org/W2962712634","https://openalex.org/W3099258255","https://openalex.org/W3100552666","https://openalex.org/W4256021144","https://openalex.org/W6725412731"],"related_works":["https://openalex.org/W2976106059","https://openalex.org/W2060232182","https://openalex.org/W2089476296","https://openalex.org/W2295671989","https://openalex.org/W2023731335","https://openalex.org/W2548320471","https://openalex.org/W1678468747","https://openalex.org/W4297998332","https://openalex.org/W2951717444","https://openalex.org/W1985033232"],"abstract_inverted_index":{"We":[0,60,124],"consider":[1,62],"transmissions":[2],"of":[3,39,41,52,65,80,87,101,135,156],"secure":[4,25],"messages":[5],"over":[6],"a":[7,37,42,63,66,81,85,102,153],"burst":[8,26,38,67,138],"erasure":[9,27,68,139],"wiretap":[10,69],"channel":[11,70],"under":[12],"decoding":[13],"delay":[14,23,120,136],"constraint.":[15],"For":[16,105],"block":[17,54,128],"codes":[18,30,55,129,142],"we":[19,108],"introduce":[20],"and":[21,35,147],"study":[22],"optimal":[24,121,137],"correcting":[28,140],"(DO-SBE)":[29],"that":[31,106,126],"provide":[32,144],"perfect":[33,145],"security":[34,146],"recover":[36],"erasures":[40],"limited":[43],"length":[44],"with":[45],"minimum":[46],"possible":[47],"delay.":[48],"Our":[49],"explicit":[50],"constructions":[51],"DO-SBE":[53],"achieve":[56],"maximum":[57],"secrecy":[58,117],"rate.":[59],"also":[61],"model":[64,107],"for":[71,119,133,152],"the":[72,91,116,149],"streaming":[73,122,141],"setup,":[74],"where":[75],"in":[76,84,98],"any":[77],"sliding":[78],"window":[79],"given":[82,103],"size,":[83],"stream":[86],"encoded":[88],"source":[89],"packets,":[90],"eavesdropper":[92],"is":[93],"able":[94],"to":[95],"observe":[96],"packets":[97],"an":[99,110],"interval":[100],"size.":[104],"obtain":[109],"information":[111],"theoretic":[112],"upper":[113,150],"bound":[114,151],"on":[115],"rate":[118],"codes.":[123],"show":[125],"our":[127],"can":[130],"be":[131],"used":[132],"construction":[134],"which":[143],"meet":[148],"certain":[154],"class":[155],"code":[157],"parameters.":[158]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
