{"id":"https://openalex.org/W2994246709","doi":"https://doi.org/10.1109/wimob.2019.8923306","title":"An Iterative Algorithm for Wyner\u2019s Wire-Tap Equivocation Region","display_name":"An Iterative Algorithm for Wyner\u2019s Wire-Tap Equivocation Region","publication_year":2019,"publication_date":"2019-10-01","ids":{"openalex":"https://openalex.org/W2994246709","doi":"https://doi.org/10.1109/wimob.2019.8923306","mag":"2994246709"},"language":"en","primary_location":{"id":"doi:10.1109/wimob.2019.8923306","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wimob.2019.8923306","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044144731","display_name":"Meena Gangula","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Meena Gangula","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5044144731"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.137179,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"139","last_page":"143"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9751999974250793,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9735999703407288,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.6369944214820862},{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.5544671416282654},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5004770755767822},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.478145956993103},{"id":"https://openalex.org/keywords/equivocation","display_name":"Equivocation","score":0.4424929916858673},{"id":"https://openalex.org/keywords/convergence","display_name":"Convergence (economics)","score":0.43768760561943054},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3109109401702881},{"id":"https://openalex.org/keywords/mathematical-analysis","display_name":"Mathematical analysis","score":0.059878915548324585}],"concepts":[{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.6369944214820862},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.5544671416282654},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5004770755767822},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.478145956993103},{"id":"https://openalex.org/C17859611","wikidata":"https://www.wikidata.org/wiki/Q10797615","display_name":"Equivocation","level":2,"score":0.4424929916858673},{"id":"https://openalex.org/C2777303404","wikidata":"https://www.wikidata.org/wiki/Q759757","display_name":"Convergence (economics)","level":2,"score":0.43768760561943054},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3109109401702881},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.059878915548324585},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wimob.2019.8923306","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wimob.2019.8923306","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1560089794","https://openalex.org/W2012425097","https://openalex.org/W2029236670","https://openalex.org/W2043769961","https://openalex.org/W2068660182","https://openalex.org/W2094458162","https://openalex.org/W2098115979","https://openalex.org/W2106690919","https://openalex.org/W2143062570","https://openalex.org/W2144007657","https://openalex.org/W2148986322","https://openalex.org/W2157602587","https://openalex.org/W2159902206","https://openalex.org/W2296319761","https://openalex.org/W2485089179","https://openalex.org/W4250589301"],"related_works":["https://openalex.org/W2884693032","https://openalex.org/W2022034366","https://openalex.org/W2992325167","https://openalex.org/W2342506563","https://openalex.org/W4246965388","https://openalex.org/W1946048292","https://openalex.org/W2276821839","https://openalex.org/W3182326346","https://openalex.org/W1994672379","https://openalex.org/W4232700914"],"abstract_inverted_index":{"In":[0],"this":[1,80],"paper,":[2],"we":[3],"propose":[4,45],"an":[5,46],"iterative":[6,47],"algorithm":[7,48,81],"for":[8,49,56,100],"calculating":[9],"Wyner's":[10],"wire-tap":[11,39],"equivocation":[12,21,113],"region.":[13],"We":[14,44],"show":[15],"that":[16],"the":[17,20,27,30,38,74,85,101,104,112],"calculation":[18,102],"of":[19,29,37,73,79,103],"region":[22,114],"can":[23,67],"be":[24,68],"reduced":[25],"to":[26],"computation":[28],"function":[31,105],"\u0393(R":[32,51,91,106],"<sub":[33,52,62,92,107],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[34,53,63,93,108],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">b</sub>":[35,54,64,94,109],")":[36,55,95,110],"channel":[40],"defined":[41],"by":[42],"Wyner.":[43],"computing":[50],"a":[57,71],"given":[58],"bit":[59],"rate":[60],"R":[61],",":[65],"which":[66],"viewed":[69],"as":[70],"generalization":[72],"Arimoto-Blahut":[75],"method.":[76],"The":[77],"convergence":[78],"is":[82],"proved":[83],"and":[84,87,111],"upper":[86],"lower":[88],"bounds":[89],"on":[90],"are":[96,115],"derived.":[97],"Simulation":[98],"results":[99],"provided.":[116]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
