{"id":"https://openalex.org/W2012503258","doi":"https://doi.org/10.1109/wifs.2012.6412659","title":"Non-regenerative two-hop wiretap channels using interference neutralization","display_name":"Non-regenerative two-hop wiretap channels using interference neutralization","publication_year":2012,"publication_date":"2012-12-01","ids":{"openalex":"https://openalex.org/W2012503258","doi":"https://doi.org/10.1109/wifs.2012.6412659","mag":"2012503258"},"language":"en","primary_location":{"id":"doi:10.1109/wifs.2012.6412659","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wifs.2012.6412659","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://orbilu.uni.lu/handle/10993/7586","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045112912","display_name":"Sabrina Gerbracht","orcid":null},"institutions":[{"id":"https://openalex.org/I78650965","display_name":"TU Dresden","ror":"https://ror.org/042aqky30","country_code":"DE","type":"education","lineage":["https://openalex.org/I78650965"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Sabrina Gerbracht","raw_affiliation_strings":["Communications Theory, Dresden University of Technology, Dresden, Germany","[Communications Theory Communications Laboratory, Dresden University of Technology, Dresden, Germany]"],"affiliations":[{"raw_affiliation_string":"Communications Theory, Dresden University of Technology, Dresden, Germany","institution_ids":["https://openalex.org/I78650965"]},{"raw_affiliation_string":"[Communications Theory Communications Laboratory, Dresden University of Technology, Dresden, Germany]","institution_ids":["https://openalex.org/I78650965"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029956964","display_name":"Eduard A. Jorswieck","orcid":"https://orcid.org/0000-0001-7893-8435"},"institutions":[{"id":"https://openalex.org/I78650965","display_name":"TU Dresden","ror":"https://ror.org/042aqky30","country_code":"DE","type":"education","lineage":["https://openalex.org/I78650965"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Eduard A. Jorswieck","raw_affiliation_strings":["Communications Theory, Dresden University of Technology, Dresden, Germany","[Communications Theory Communications Laboratory, Dresden University of Technology, Dresden, Germany]"],"affiliations":[{"raw_affiliation_string":"Communications Theory, Dresden University of Technology, Dresden, Germany","institution_ids":["https://openalex.org/I78650965"]},{"raw_affiliation_string":"[Communications Theory Communications Laboratory, Dresden University of Technology, Dresden, Germany]","institution_ids":["https://openalex.org/I78650965"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024123401","display_name":"Gan Zheng","orcid":"https://orcid.org/0000-0001-8457-6477"},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Gan Zheng","raw_affiliation_strings":["Interdisciplinary Centre for Security, University of Luxembourg, Luxembourg","Interdisciplinary Centre for Security, Reliability and Trust University of Luxembourg Luxembourg"],"affiliations":[{"raw_affiliation_string":"Interdisciplinary Centre for Security, University of Luxembourg, Luxembourg","institution_ids":["https://openalex.org/I186903577"]},{"raw_affiliation_string":"Interdisciplinary Centre for Security, Reliability and Trust University of Luxembourg Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080037825","display_name":"Bj\u00f6rn Ottersten","orcid":"https://orcid.org/0000-0003-2298-6774"},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Bjorn Ottersten","raw_affiliation_strings":["Interdisciplinary Centre for Security, University of Luxembourg, Luxembourg","Interdisciplinary Centre for Security, Reliability and Trust University of Luxembourg Luxembourg"],"affiliations":[{"raw_affiliation_string":"Interdisciplinary Centre for Security, University of Luxembourg, Luxembourg","institution_ids":["https://openalex.org/I186903577"]},{"raw_affiliation_string":"Interdisciplinary Centre for Security, Reliability and Trust University of Luxembourg Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5045112912"],"corresponding_institution_ids":["https://openalex.org/I78650965"],"apc_list":null,"apc_paid":null,"fwci":0.9959,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.78108499,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"258","last_page":"263"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10148","display_name":"Advanced MIMO Systems Optimization","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/relay","display_name":"Relay","score":0.7661822438240051},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.7518937587738037},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6938881874084473},{"id":"https://openalex.org/keywords/offset","display_name":"Offset (computer science)","score":0.5850052833557129},{"id":"https://openalex.org/keywords/interference","display_name":"Interference (communication)","score":0.5596820712089539},{"id":"https://openalex.org/keywords/hop","display_name":"Hop (telecommunications)","score":0.5552037358283997},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.5480279922485352},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.5258128046989441},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4773423969745636},{"id":"https://openalex.org/keywords/electronic-engineering","display_name":"Electronic engineering","score":0.45214352011680603},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.45130595564842224},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.42414596676826477},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.3991953134536743},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.32418984174728394},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.22102901339530945},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.17071309685707092},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.1287039816379547},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.09052097797393799}],"concepts":[{"id":"https://openalex.org/C2778156585","wikidata":"https://www.wikidata.org/wiki/Q174053","display_name":"Relay","level":3,"score":0.7661822438240051},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.7518937587738037},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6938881874084473},{"id":"https://openalex.org/C175291020","wikidata":"https://www.wikidata.org/wiki/Q1156822","display_name":"Offset (computer science)","level":2,"score":0.5850052833557129},{"id":"https://openalex.org/C32022120","wikidata":"https://www.wikidata.org/wiki/Q797225","display_name":"Interference (communication)","level":3,"score":0.5596820712089539},{"id":"https://openalex.org/C25906391","wikidata":"https://www.wikidata.org/wiki/Q1432381","display_name":"Hop (telecommunications)","level":2,"score":0.5552037358283997},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.5480279922485352},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.5258128046989441},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4773423969745636},{"id":"https://openalex.org/C24326235","wikidata":"https://www.wikidata.org/wiki/Q126095","display_name":"Electronic engineering","level":1,"score":0.45214352011680603},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.45130595564842224},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.42414596676826477},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.3991953134536743},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.32418984174728394},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.22102901339530945},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.17071309685707092},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.1287039816379547},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.09052097797393799},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/wifs.2012.6412659","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wifs.2012.6412659","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","raw_type":"proceedings-article"},{"id":"pmh:oai:orbilu.uni.lu:10993/7586","is_oa":true,"landing_page_url":"http://orbilu.uni.lu/handle/10993/7586","pdf_url":null,"source":{"id":"https://openalex.org/S4306401815","display_name":"Open Repository and Bibliography (University of Luxembourg)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I186903577","host_organization_name":"University of Luxembourg","host_organization_lineage":["https://openalex.org/I186903577"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-sa","license_id":"https://openalex.org/licenses/cc-by-nc-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Information Forensics and Security (WIFS), 2012 IEEE International Workshop on, 258 - 263 (2012); Information Forensics and Security (WIFS), 2012 IEEE International Workshop on, Tenerife, Spain [ES], December 2-5, 2012","raw_type":"peer reviewed"},{"id":"pmh:oai:qucosa:de:qucosa:26894","is_oa":true,"landing_page_url":"https://tud.qucosa.de/id/qucosa%3A26894","pdf_url":null,"source":{"id":"https://openalex.org/S4377196312","display_name":"Qucosa (Saxon State and University Library Dresden)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I3132420320","host_organization_name":"SLUB Dresden","host_organization_lineage":["https://openalex.org/I3132420320"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Proceedings of IEEE International Workshop on Information Forensics and Security (WIFS 2012), Teneriffa, Spanien, 2-5 Dez. 2012, S. 258 - 263, ISBN: 978-1-4673-2285-0","raw_type":"doc-type:Text"}],"best_oa_location":{"id":"pmh:oai:orbilu.uni.lu:10993/7586","is_oa":true,"landing_page_url":"http://orbilu.uni.lu/handle/10993/7586","pdf_url":null,"source":{"id":"https://openalex.org/S4306401815","display_name":"Open Repository and Bibliography (University of Luxembourg)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I186903577","host_organization_name":"University of Luxembourg","host_organization_lineage":["https://openalex.org/I186903577"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-sa","license_id":"https://openalex.org/licenses/cc-by-nc-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Information Forensics and Security (WIFS), 2012 IEEE International Workshop on, 258 - 263 (2012); Information Forensics and Security (WIFS), 2012 IEEE International Workshop on, Tenerife, Spain [ES], December 2-5, 2012","raw_type":"peer reviewed"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W949353694","https://openalex.org/W1508697287","https://openalex.org/W1986064547","https://openalex.org/W2043769961","https://openalex.org/W2053738266","https://openalex.org/W2079364662","https://openalex.org/W2100559814","https://openalex.org/W2120249541","https://openalex.org/W2124071994","https://openalex.org/W2125016043","https://openalex.org/W2128153585","https://openalex.org/W2142102521","https://openalex.org/W2144007657","https://openalex.org/W2146370286","https://openalex.org/W2171006634","https://openalex.org/W2181292907","https://openalex.org/W4293702014"],"related_works":["https://openalex.org/W2493929861","https://openalex.org/W2475541339","https://openalex.org/W2107199751","https://openalex.org/W565335793","https://openalex.org/W2363071176","https://openalex.org/W99756173","https://openalex.org/W4300441478","https://openalex.org/W2062965938","https://openalex.org/W4243812570","https://openalex.org/W2519669146"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3,70],"analyze":[4],"the":[5,10,18,21,27,30,47,50,56,82,86,90,96,112,117,124],"achievable":[6],"secrecy":[7],"rates":[8],"in":[9,42],"two-hop":[11],"wiretap":[12],"channel":[13],"with":[14],"four":[15],"nodes,":[16],"where":[17],"transmitter":[19],"and":[20,29,45,62,89,94],"receiver":[22],"have":[23,32],"multiple":[24],"antennas":[25],"while":[26],"relay":[28,39],"eavesdropper":[31],"only":[33],"a":[34,76],"single":[35],"antenna":[36],"each.":[37],"The":[38],"is":[40,102,121],"operating":[41],"amplify-and-forward":[43],"mode":[44],"all":[46],"channels":[48],"between":[49],"nodes":[51],"are":[52],"known":[53],"perfectly":[54],"by":[55,98,108],"transmitter.":[57],"We":[58,80],"discuss":[59],"different":[60,83],"transmission":[61],"protection":[63,78],"schemes":[64,84],"like":[65],"artificial":[66],"noise":[67],"(AN).":[68],"Furthermore,":[69],"introduce":[71],"interference":[72],"neutralization":[73],"(IN)":[74],"as":[75,105,107],"new":[77],"scheme.":[79],"compare":[81],"regarding":[85],"high-SNR":[87,91],"slope":[88],"power":[92],"offset":[93],"illustrate":[95],"performance":[97,115],"simulation":[99],"results.":[100],"It":[101],"shown":[103],"analytically":[104],"well":[106],"numerical":[109],"simulations":[110],"that":[111],"high":[113],"SNR":[114],"of":[116,126],"proposed":[118],"IN":[119],"scheme":[120],"better":[122],"than":[123],"one":[125],"AN.":[127]},"counts_by_year":[{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
