Cooperative jamming polar codes for multiple-access wiretap channels

The authors study cooperative security in the physical layer of wireless systems based on the recently developed polar codes for multiple access channel (MAC). Specifically, the authors first consider the case of a m-user MAC with external eavesdropper. Using polar alignment, the authors formulate a...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IET communications Jg. 10; H. 4; S. 407 - 415
Hauptverfasser: Hajimomeni, Mona, Aghaeinia, Hassan, Kim, Il-Min, Kim, Kwihoon
Format: Journal Article
Sprache:Englisch
Veröffentlicht: The Institution of Engineering and Technology 03.03.2016
Schlagworte:
ISSN:1751-8628, 1751-8636
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract The authors study cooperative security in the physical layer of wireless systems based on the recently developed polar codes for multiple access channel (MAC). Specifically, the authors first consider the case of a m-user MAC with external eavesdropper. Using polar alignment, the authors formulate a discrete optimisation problem where security and reliability criteria can be handled separately over the bases of a set of deterministic binary matrices. A discrete algorithm with incrementally polynomial complexity is used to maximise the uniform sum secrecy rate of users. Moreover, the proposed coding scheme is shown to achieve strong security for any subset of users. The authors next examine the case of minimum number of cooperative helpers to fulfil a feasible secrecy rate requirement at the legitimate user. Here, a low-complexity suboptimal algorithm is presented with at most one helper more than the optimal solution. Using Tal–Sharov–Vardy implementation of MAC polar codes, secure polar coding is implemented for a 2-user Gaussian wiretap MAC channel. The upper and lower bound of block error probability are compared, respectively, at the legitimate receiver and the eavesdropper. The results demonstrate clearly that with sufficiently long block length, strong secrecy with respect to the eavesdropper is achieved, while block error probability approaches 0.5.
AbstractList The authors study cooperative security in the physical layer of wireless systems based on the recently developed polar codes for multiple access channel (MAC). Specifically, the authors first consider the case of a m ‐user MAC with external eavesdropper. Using polar alignment, the authors formulate a discrete optimisation problem where security and reliability criteria can be handled separately over the bases of a set of deterministic binary matrices. A discrete algorithm with incrementally polynomial complexity is used to maximise the uniform sum secrecy rate of users. Moreover, the proposed coding scheme is shown to achieve strong security for any subset of users. The authors next examine the case of minimum number of cooperative helpers to fulfil a feasible secrecy rate requirement at the legitimate user. Here, a low‐complexity suboptimal algorithm is presented with at most one helper more than the optimal solution. Using Tal–Sharov–Vardy implementation of MAC polar codes, secure polar coding is implemented for a 2‐user Gaussian wiretap MAC channel. The upper and lower bound of block error probability are compared, respectively, at the legitimate receiver and the eavesdropper. The results demonstrate clearly that with sufficiently long block length, strong secrecy with respect to the eavesdropper is achieved, while block error probability approaches 0.5.
Author Kim, Kwihoon
Kim, Il-Min
Hajimomeni, Mona
Aghaeinia, Hassan
Author_xml – sequence: 1
  givenname: Mona
  surname: Hajimomeni
  fullname: Hajimomeni, Mona
  organization: 1Department of Electrical Engineering, Amirkabir University of Technology (Tehran Polytechnic), 424 Hafez Ave, Tehran, Iran
– sequence: 2
  givenname: Hassan
  surname: Aghaeinia
  fullname: Aghaeinia, Hassan
  email: aghaeini@aut.ac.ir
  organization: 1Department of Electrical Engineering, Amirkabir University of Technology (Tehran Polytechnic), 424 Hafez Ave, Tehran, Iran
– sequence: 3
  givenname: Il-Min
  surname: Kim
  fullname: Kim, Il-Min
  organization: 2Department of Electrical and Computer Engineering, Queen's University, Kingston, Ontario K7L 3N6, Canada
– sequence: 4
  givenname: Kwihoon
  surname: Kim
  fullname: Kim, Kwihoon
  organization: 3Future Technology Department, Electronic and Telecommunication Research Institute (ETRI), 218 Gajeong-ro, Yuseong-gu, Daejeon 34129, Korea
BookMark eNqFkMtOxCAUQInRRB39AHdd6qLjhQKt7rQ-E81sdE0YeqtMaKnQceLf22aMMcbHCkjOIfeeXbLZ-hYJOaAwpcBPji32qfHNlAEVU5CMb5AdmguaFjKTm593VmyT3RgXAEJIznfIRel9h0H39hWThW4a2z4lnXc6JMZXGJPah6RZut52DlNtDMaYrGzAXneJedZtiy7uka1au4j7H-eEPF5dPpQ36d3s-rY8u0sNBwopL3JZC-SVrBgaBihQcACjOcvmUGiY60wXmaxllQETZk4rhDnNKNOm1lmeTcjh-t8u-Jclxl41Nhp0Trfol1HRAgoKJzKHAc3XqAk-xoC1MrYftvRtH7R1ioIau6mhmxq6qbGbGrsNJv1mdsE2Orz96ZyunZV1-Pa_oMr7R3Z-NTzFOOrRWh6xhV-Gdmiobi8fVDm7_-J0VT2w6Q_s74O9A5X_o14
CitedBy_id crossref_primary_10_1186_s13638_017_0947_7
crossref_primary_10_1155_2021_6638405
crossref_primary_10_1109_ACCESS_2018_2813998
crossref_primary_10_1109_JSAC_2018_2825818
Cites_doi 10.1109/TIT.2009.2021379
10.1109/ITW.2014.6970875
10.1109/TIT.2011.2162275
10.1109/ISIT.2014.6875037
10.1109/ISIT.2011.6034088
10.1109/MSP.2013.2260875
10.1109/TIT.2007.901143
10.1109/TIT.2008.921680
10.1137/S0895480103428338
10.1109/ITA.2010.5454148
10.1109/ISIT.2012.6283739
10.1109/MSP.2013.2265141
10.1109/ITW.2012.6404716
10.1109/TIT.2012.2201374
10.1109/ISIT.2011.6033992
10.1109/Allerton.2011.6120174
10.1109/TIT.2011.2170660
ContentType Journal Article
Copyright The Institution of Engineering and Technology
2021 The Institution of Engineering and Technology
Copyright_xml – notice: The Institution of Engineering and Technology
– notice: 2021 The Institution of Engineering and Technology
DBID AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
DOI 10.1049/iet-com.2015.0624
DatabaseName CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList CrossRef

Technology Research Database

DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1751-8636
EndPage 415
ExternalDocumentID 10_1049_iet_com_2015_0624
CMU2BF01550
Genre article
GroupedDBID 0R
24P
29I
4IJ
5GY
6IK
8VB
AAJGR
ABPTK
ACGFS
ACIWK
AENEX
ALMA_UNASSIGNED_HOLDINGS
BFFAM
CS3
DU5
ESX
HZ
IFIPE
IPLJI
JAVBF
LAI
LOTEE
LXI
M43
MS
NADUK
NXXTH
O9-
OCL
QWB
RIE
RNS
RUI
U5U
UNMZH
ZL0
ZZ
.DC
0R~
0ZK
1OC
2QL
4.4
6OB
8FE
8FG
96U
AAHHS
AAHJG
ABJCF
ABQXS
ACCFJ
ACCMX
ACESK
ACGFO
ACXQS
ADEYR
AEEZP
AEGXH
AEQDE
AFAZI
AFKRA
AIAGR
AIWBW
AJBDE
ALUQN
ARAPS
AVUZU
BENPR
BGLVJ
CCPQU
EBS
EJD
F8P
GOZPB
GROUPED_DOAJ
GRPMH
HCIFZ
HZ~
IAO
ITC
K1G
L6V
M7S
MCNEO
MS~
OK1
P62
PTHSS
ROL
S0W
~ZZ
AAMMB
AAYXX
AEFGJ
AFFHD
AGXDD
AIDQK
AIDYY
CITATION
IDLOA
PHGZM
PHGZT
PQGLB
WIN
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c4010-4876f5e4d6d2ec20e5e5400ca423b08a0ba3a836f6d3025cb1de0b1312acfa373
IEDL.DBID 24P
ISICitedReferencesCount 7
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000372208100008&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1751-8628
IngestDate Fri Sep 05 10:50:16 EDT 2025
Wed Oct 29 21:23:28 EDT 2025
Tue Nov 18 21:41:12 EST 2025
Wed Jan 22 16:30:53 EST 2025
Thu May 09 18:26:38 EDT 2019
Tue Jan 05 21:44:35 EST 2021
IsPeerReviewed true
IsScholarly true
Issue 4
Keywords telecommunication security
channel coding
Tal–Sharov–Vardy implementation
multiple-access wiretap channels
2-user Gaussian wiretap MAC channel
multiuser channels
optimisation
cooperative jamming polar codes
telecommunication network reliability
multiple access channel
legitimate receiver
multi-access systems
reliability criteria
external eavesdropper
Gaussian channels
error statistics
wireless systems
discrete optimisation problem
polar alignment
cooperative security
m-user MAC
upper bound
lower bound
low-complexity suboptimal algorithm
cooperative communication
matrix algebra
polynomial complexity
deterministic binary matrices
block error probability
uniform sum secrecy rate maximization
computational complexity
Language English
License http://onlinelibrary.wiley.com/termsAndConditions#vor
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c4010-4876f5e4d6d2ec20e5e5400ca423b08a0ba3a836f6d3025cb1de0b1312acfa373
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
PQID 1808109670
PQPubID 23500
PageCount 9
ParticipantIDs proquest_miscellaneous_1808109670
crossref_citationtrail_10_1049_iet_com_2015_0624
crossref_primary_10_1049_iet_com_2015_0624
wiley_primary_10_1049_iet_com_2015_0624_CMU2BF01550
iet_journals_10_1049_iet_com_2015_0624
ProviderPackageCode RUI
PublicationCentury 2000
PublicationDate 2016-03-03
PublicationDateYYYYMMDD 2016-03-03
PublicationDate_xml – month: 03
  year: 2016
  text: 2016-03-03
  day: 03
PublicationDecade 2010
PublicationTitle IET communications
PublicationYear 2016
Publisher The Institution of Engineering and Technology
Publisher_xml – name: The Institution of Engineering and Technology
References Abbe, E.; Telatar, I.E. (C16) 2012; 58
Khachiyan, L.; Boros, E.; Elbassioni, K. (C15) 2006; 19
Arikan, E. (C14) 2009; 55
Mahdavifar, H.; Vardy, A. (C5) 2011; 57
Cheraghchi, M.; Didier, F.; Shokrollahi, A. (C7) 2012; 58
Harrison, W.K.; Almeida, J.; Bloch, M.R. (C8) 2013; 30
Bassily, R.; Ekrem, E.; He, X. (C1) 2013; 30
Tekin, E.; Yener, A. (C2) 2008; 54
Thangaraj, A.; Dihidar, S.; Calderbank, A.S. (C3) 2007; 53
2009; 55
2006; 19
2008; 54
2011; 57
2014
2007; 53
2012; 58
2012
2011
2010
2013; 30
2012; 7417
e_1_2_8_17_1
e_1_2_8_18_1
e_1_2_8_19_1
e_1_2_8_13_1
e_1_2_8_14_1
Bellare M. (e_1_2_8_7_1) 2012
e_1_2_8_15_1
e_1_2_8_16_1
e_1_2_8_3_1
e_1_2_8_2_1
e_1_2_8_5_1
e_1_2_8_4_1
e_1_2_8_6_1
e_1_2_8_9_1
e_1_2_8_8_1
e_1_2_8_20_1
e_1_2_8_10_1
e_1_2_8_11_1
e_1_2_8_12_1
References_xml – volume: 30
  start-page: 41
  issue: 5
  year: 2013
  end-page: 50
  ident: C8
  article-title: Coding for secrecy: an overview of error-control coding techniques for physical-layer security
  publication-title: IEEE Signal Process Mag.,
– volume: 53
  start-page: 2933
  issue: 8
  year: 2007
  end-page: 2945
  ident: C3
  article-title: Applications of LDPC codes to the wiretap channel
  publication-title: IEEE Trans. Inf. Theory
– volume: 55
  start-page: 3051
  issue: 7
  year: 2009
  end-page: 3073
  ident: C14
  article-title: Channel polarization: a method for constructing capacity achieving codes for symmetric binary-input memoryless channels
  publication-title: IEEE Trans. Inf. Theory
– volume: 54
  start-page: 2735
  issue: 6
  year: 2008
  end-page: 2751
  ident: C2
  article-title: The general Gaussian multiple-access and two-way wiretap channel: achievable rates and cooperative jamming
  publication-title: IEEE Trans. Inf. Theory
– volume: 58
  start-page: 5437
  issue: 8
  year: 2012
  end-page: 5448
  ident: C16
  article-title: Polar codes for the m-user multiple access channel
  publication-title: IEEE Trans. Inf. Theory
– volume: 30
  start-page: 16
  issue: 5
  year: 2013
  end-page: 28
  ident: C1
  article-title: Cooperative security at the physical layer: a summary of recent advances
  publication-title: IEEE Signal Process. Mag.
– volume: 57
  start-page: 6428
  issue: 10
  year: 2011
  end-page: 6443
  ident: C5
  article-title: Achieving the secrecy capacity of wiretap channels using polar codes
  publication-title: IEEE Trans. Inf. Theory
– volume: 58
  start-page: 1254
  issue: 2
  year: 2012
  end-page: 1274
  ident: C7
  article-title: Invertible extractors and wiretap protocols
  publication-title: IEEE Trans. Inf. Theory
– volume: 19
  start-page: 966
  issue: 4
  year: 2006
  end-page: 984
  ident: C15
  article-title: On the complexity of some enumeration algorithms for matroids
  publication-title: SIAM J. Discrete Math.
– start-page: 2132
  year: 2012
  end-page: 2136
– volume: 57
  start-page: 6428
  issue: 10
  year: 2011
  end-page: 6443
  article-title: Achieving the secrecy capacity of wiretap channels using polar codes
  publication-title: IEEE Trans. Inf. Theory
– start-page: 1271
  year: 2014
  end-page: 1275
– start-page: 1
  year: 2010
  end-page: 8
– volume: 54
  start-page: 2735
  issue: 6
  year: 2008
  end-page: 2751
  article-title: The general Gaussian multiple‐access and two‐way wiretap channel: achievable rates and cooperative jamming
  publication-title: IEEE Trans. Inf. Theory
– start-page: 240
  year: 2011
  end-page: 246
– start-page: 2393
  year: 2011
  end-page: 2397
– volume: 7417
  start-page: 294
  year: 2012
  end-page: 331
– start-page: 466
  year: 2014
  end-page: 470
– volume: 58
  start-page: 5437
  issue: 8
  year: 2012
  end-page: 5448
  article-title: Polar codes for the m‐user multiple access channel
  publication-title: IEEE Trans. Inf. Theory
– start-page: 462
  year: 2012
  end-page: 466
– start-page: 71
  year: 2010
  end-page: 75
– volume: 19
  start-page: 966
  issue: 4
  year: 2006
  end-page: 984
  article-title: On the complexity of some enumeration algorithms for matroids
  publication-title: SIAM J. Discrete Math.
– volume: 30
  start-page: 16
  issue: 5
  year: 2013
  end-page: 28
  article-title: Cooperative security at the physical layer: a summary of recent advances
  publication-title: IEEE Signal Process. Mag.
– volume: 55
  start-page: 3051
  issue: 7
  year: 2009
  end-page: 3073
  article-title: Channel polarization: a method for constructing capacity achieving codes for symmetric binary‐input memoryless channels
  publication-title: IEEE Trans. Inf. Theory
– volume: 58
  start-page: 1254
  issue: 2
  year: 2012
  end-page: 1274
  article-title: Invertible extractors and wiretap protocols
  publication-title: IEEE Trans. Inf. Theory
– start-page: 2816
  year: 2011
  end-page: 2820
– volume: 30
  start-page: 41
  issue: 5
  year: 2013
  end-page: 50
  article-title: Coding for secrecy: an overview of error‐control coding techniques for physical‐layer security
  publication-title: IEEE Signal Process Mag.,
– volume: 53
  start-page: 2933
  issue: 8
  year: 2007
  end-page: 2945
  article-title: Applications of LDPC codes to the wiretap channel
  publication-title: IEEE Trans. Inf. Theory
– ident: e_1_2_8_15_1
  doi: 10.1109/TIT.2009.2021379
– start-page: 294
  volume-title: Advances in Cryptology: CRYPTO (Lecture Notes in Computer Science)
  year: 2012
  ident: e_1_2_8_7_1
– ident: e_1_2_8_11_1
  doi: 10.1109/ITW.2014.6970875
– ident: e_1_2_8_6_1
  doi: 10.1109/TIT.2011.2162275
– ident: e_1_2_8_20_1
  doi: 10.1109/ISIT.2014.6875037
– ident: e_1_2_8_19_1
  doi: 10.1109/ISIT.2011.6034088
– ident: e_1_2_8_2_1
  doi: 10.1109/MSP.2013.2260875
– ident: e_1_2_8_4_1
  doi: 10.1109/TIT.2007.901143
– ident: e_1_2_8_3_1
  doi: 10.1109/TIT.2008.921680
– ident: e_1_2_8_16_1
  doi: 10.1137/S0895480103428338
– ident: e_1_2_8_12_1
  doi: 10.1109/ITA.2010.5454148
– ident: e_1_2_8_18_1
  doi: 10.1109/ISIT.2012.6283739
– ident: e_1_2_8_9_1
  doi: 10.1109/MSP.2013.2265141
– ident: e_1_2_8_10_1
  doi: 10.1109/ITW.2012.6404716
– ident: e_1_2_8_17_1
  doi: 10.1109/TIT.2012.2201374
– ident: e_1_2_8_13_1
– ident: e_1_2_8_5_1
  doi: 10.1109/ISIT.2011.6033992
– ident: e_1_2_8_14_1
  doi: 10.1109/Allerton.2011.6120174
– ident: e_1_2_8_8_1
  doi: 10.1109/TIT.2011.2170660
SSID ssj0055644
Score 2.1082838
Snippet The authors study cooperative security in the physical layer of wireless systems based on the recently developed polar codes for multiple access channel (MAC)....
SourceID proquest
crossref
wiley
iet
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 407
SubjectTerms 2‐user Gaussian wiretap MAC channel
Algorithms
block error probability
Blocking
channel coding
Channels
Coding
computational complexity
cooperative communication
cooperative jamming polar codes
cooperative security
deterministic binary matrices
discrete optimisation problem
error statistics
Errors
external eavesdropper
Gaussian
Gaussian channels
legitimate receiver
lower bound
low‐complexity suboptimal algorithm
matrix algebra
multiple access channel
multiple‐access wiretap channels
multiuser channels
multi‐access systems
m‐user MAC
optimisation
Optimization
polar alignment
polynomial complexity
reliability criteria
Security
Tal–Sharov–Vardy implementation
telecommunication network reliability
telecommunication security
uniform sum secrecy rate maximization
upper bound
wireless systems
Title Cooperative jamming polar codes for multiple-access wiretap channels
URI http://digital-library.theiet.org/content/journals/10.1049/iet-com.2015.0624
https://onlinelibrary.wiley.com/doi/abs/10.1049%2Fiet-com.2015.0624
https://www.proquest.com/docview/1808109670
Volume 10
WOSCitedRecordID wos000372208100008&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVWIB
  databaseName: Wiley Online Library Free Content
  customDbUrl:
  eissn: 1751-8636
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0055644
  issn: 1751-8628
  databaseCode: WIN
  dateStart: 20130101
  isFulltext: true
  titleUrlDefault: https://onlinelibrary.wiley.com
  providerName: Wiley-Blackwell
– providerCode: PRVWIB
  databaseName: Wiley Online Library Open Access
  customDbUrl:
  eissn: 1751-8636
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0055644
  issn: 1751-8628
  databaseCode: 24P
  dateStart: 20130101
  isFulltext: true
  titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html
  providerName: Wiley-Blackwell
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3NTtwwEB4ttIdygNIWsfzJVFUPlVISO3GSI0SsyoHtHhZ1b5bjHwkEuxG7cOYReEaehLGTbFkhgYS45OCMLWs84_nGY88A_FDaZXymecAk5UGcWlSpONWBZSZS6BMZ3hSbSPv9bDTKBx0o2rcwdX6I-YGb0wy_XzsFl2VdhQRBLS7iuZkF7sIHWrDkd8hpvAQfooilTrRpPGi34yThvqIrmskoQPiezUOb-cGzIRaM0xL-XsCdT9GrNz-9tXeZ-GdYbdAnOazFZR06ZvwFVp7kJPwKvWIyqUydD5xcyKsrbCWVc4CJe_4-JYhySXsN8eHuXvqKi8SlPJ7JiriHxDjB6Tc46x0Piz9BU2whULELiKPjwm1iYs01NYqGJjEI5kIlEW-VYSbDUjKZMW65ZoiTVBlpE5YRi6hUVrKUbcDyeDI2m0ASneY2t4zKzKLt45mWCAxjWto8ySQ3XQhbLgvVZCJ3BTEuhY-Ix7lAFglkkXAsEo5FXfg171LVaTheIv7p2hplnL5E-H2B8OR4KIq_p_8JRKVtF_ZbERCoei6eIsdmcoPjuqol6AKmYReYX_HX5yaK0zN61POe4dabem3DJ2zn_h4c24Hl2fWN2YWP6nZ2Pr3e87KP338n_Ue9GQc_
linkProvider Wiley-Blackwell
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb9QwEB61BQk48EYs5WEQ4oAUmtiOkxxh6aoV3aWHrdSb5fghtaK7UXfLmZ_Ab-SXdMZJlq6QioS4OmPLmng833jsbwDeWkeMz7xKhOEqkUVAk5KFS4LwmcWYyKuu2EQxmZTHx9XhBnzu38K0_BCrAzeyjLhfk4HTgXQbcEoiyTzxy4RufKALyz-kistNuCHR21AdAy4P-_04z1Us6Yp-MksQv5er3Ga188cQa95pEz-vAc-r8DX6n9G9_zPz-3C3w5_sY7tgHsCGnz2EO1dYCR_BaDifN75lBGen5uwMW1lDITCjB_ALhjiX9RcRf_34aWLNRUakx0vTMHpKjDNcPIaj0e50uJd05RYSKykljqGLCrmXTjnuLU997hHOpdYg4qrT0qS1EaYUKignECnZOnM-rTORcWODEYV4Aluz-cw_BZa7ogpVENyUAb2fKp1BaCh5Haq8NMoPIO3VrG3HRU4lMb7pmBOXlUYVaVSRJhVpUtEA3q-6NC0Rx3XC76itM8fFdYJv1gT3d6d6-HX8W0A3Lgzgdb8GNBofZVTMzM8vcFyqW4JBYJEOQMRf_ve56eH4iH8axdjw2T_1egW39qbjA32wP_myDbdRRsVbceI5bC3PL_wLuGm_L08W5y-jIVwCIJ8KEg
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb9QwEB61BaFy4F2xPA1CHJBSEttxkiNsG1FBlz20Um-W44dURHej7pYzP4HfyC9hxkmWrpCKhLg6Y8saezzfZOxvAF5ZR4zPvEqE4SqRRUCTkoVLgvCZxZjIq77YRDGZlCcn1XQD9oa3MB0_xOqHG1lGPK_JwH3rQhdwSiLJPPXLhG58oAvLd1PF5SZckzmetcTvLKfDeZznKpZ0RT-ZJYjfy1Vus3r7xxBr3mkTP68Bz8vwNfqf-vb_mfkduNXjT_au2zB3YcPP7sHNS6yE96Eez-et7xjB2RdzdoatrKUQmNED-AVDnMuGi4g_v_8wseYiI9LjpWkZPSXGGS4ewHG9fzT-kPTlFhIrKSWOoYsKuZdOOe4tT33uEc6l1iDiatLSpI0RphQqKCcQKdkmcz5tMpFxY4MRhdiBrdl85h8Cy11RhSoIbsqA3k-VziA0lLwJVV4a5UeQDmrWtucip5IYX3XMictKo4o0qkiTijSpaARvVl3ajojjKuHX1Nab4-IqwZdrggf7R3r8-fC3gMaVG8GLYQ9oND7KqJiZn1_guFS3BIPAIh2BiEv-97np8eExf1_H2PDRP_V6Djeme7X-dDD5-Bi2UUTFS3HiCWwtzy_8U7huvy1PF-fPoh38Arf_CZY
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cooperative+jamming+polar+codes+for+multiple-access+wiretap+channels&rft.jtitle=IET+communications&rft.au=Hajimomeni%2C+Mona&rft.au=Aghaeinia%2C+Hassan&rft.au=Kim%2C+Il-Min&rft.au=Kim%2C+Kwihoon&rft.date=2016-03-03&rft.pub=The+Institution+of+Engineering+and+Technology&rft.issn=1751-8628&rft.eissn=1751-8636&rft.volume=10&rft.issue=4&rft.spage=407&rft.epage=415&rft_id=info:doi/10.1049%2Fiet-com.2015.0624&rft.externalDocID=10_1049_iet_com_2015_0624
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1751-8628&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1751-8628&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1751-8628&client=summon