Cooperative jamming polar codes for multiple-access wiretap channels
The authors study cooperative security in the physical layer of wireless systems based on the recently developed polar codes for multiple access channel (MAC). Specifically, the authors first consider the case of a m-user MAC with external eavesdropper. Using polar alignment, the authors formulate a...
Uložené v:
| Vydané v: | IET communications Ročník 10; číslo 4; s. 407 - 415 |
|---|---|
| Hlavní autori: | , , , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
The Institution of Engineering and Technology
03.03.2016
|
| Predmet: | |
| ISSN: | 1751-8628, 1751-8636 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | The authors study cooperative security in the physical layer of wireless systems based on the recently developed polar codes for multiple access channel (MAC). Specifically, the authors first consider the case of a m-user MAC with external eavesdropper. Using polar alignment, the authors formulate a discrete optimisation problem where security and reliability criteria can be handled separately over the bases of a set of deterministic binary matrices. A discrete algorithm with incrementally polynomial complexity is used to maximise the uniform sum secrecy rate of users. Moreover, the proposed coding scheme is shown to achieve strong security for any subset of users. The authors next examine the case of minimum number of cooperative helpers to fulfil a feasible secrecy rate requirement at the legitimate user. Here, a low-complexity suboptimal algorithm is presented with at most one helper more than the optimal solution. Using Tal–Sharov–Vardy implementation of MAC polar codes, secure polar coding is implemented for a 2-user Gaussian wiretap MAC channel. The upper and lower bound of block error probability are compared, respectively, at the legitimate receiver and the eavesdropper. The results demonstrate clearly that with sufficiently long block length, strong secrecy with respect to the eavesdropper is achieved, while block error probability approaches 0.5. |
|---|---|
| AbstractList | The authors study cooperative security in the physical layer of wireless systems based on the recently developed polar codes for multiple access channel (MAC). Specifically, the authors first consider the case of a m ‐user MAC with external eavesdropper. Using polar alignment, the authors formulate a discrete optimisation problem where security and reliability criteria can be handled separately over the bases of a set of deterministic binary matrices. A discrete algorithm with incrementally polynomial complexity is used to maximise the uniform sum secrecy rate of users. Moreover, the proposed coding scheme is shown to achieve strong security for any subset of users. The authors next examine the case of minimum number of cooperative helpers to fulfil a feasible secrecy rate requirement at the legitimate user. Here, a low‐complexity suboptimal algorithm is presented with at most one helper more than the optimal solution. Using Tal–Sharov–Vardy implementation of MAC polar codes, secure polar coding is implemented for a 2‐user Gaussian wiretap MAC channel. The upper and lower bound of block error probability are compared, respectively, at the legitimate receiver and the eavesdropper. The results demonstrate clearly that with sufficiently long block length, strong secrecy with respect to the eavesdropper is achieved, while block error probability approaches 0.5. |
| Author | Kim, Kwihoon Kim, Il-Min Hajimomeni, Mona Aghaeinia, Hassan |
| Author_xml | – sequence: 1 givenname: Mona surname: Hajimomeni fullname: Hajimomeni, Mona organization: 1Department of Electrical Engineering, Amirkabir University of Technology (Tehran Polytechnic), 424 Hafez Ave, Tehran, Iran – sequence: 2 givenname: Hassan surname: Aghaeinia fullname: Aghaeinia, Hassan email: aghaeini@aut.ac.ir organization: 1Department of Electrical Engineering, Amirkabir University of Technology (Tehran Polytechnic), 424 Hafez Ave, Tehran, Iran – sequence: 3 givenname: Il-Min surname: Kim fullname: Kim, Il-Min organization: 2Department of Electrical and Computer Engineering, Queen's University, Kingston, Ontario K7L 3N6, Canada – sequence: 4 givenname: Kwihoon surname: Kim fullname: Kim, Kwihoon organization: 3Future Technology Department, Electronic and Telecommunication Research Institute (ETRI), 218 Gajeong-ro, Yuseong-gu, Daejeon 34129, Korea |
| BookMark | eNqFkMtOxCAUQInRRB39AHdd6qLjhQKt7rQ-E81sdE0YeqtMaKnQceLf22aMMcbHCkjOIfeeXbLZ-hYJOaAwpcBPji32qfHNlAEVU5CMb5AdmguaFjKTm593VmyT3RgXAEJIznfIRel9h0H39hWThW4a2z4lnXc6JMZXGJPah6RZut52DlNtDMaYrGzAXneJedZtiy7uka1au4j7H-eEPF5dPpQ36d3s-rY8u0sNBwopL3JZC-SVrBgaBihQcACjOcvmUGiY60wXmaxllQETZk4rhDnNKNOm1lmeTcjh-t8u-Jclxl41Nhp0Trfol1HRAgoKJzKHAc3XqAk-xoC1MrYftvRtH7R1ioIau6mhmxq6qbGbGrsNJv1mdsE2Orz96ZyunZV1-Pa_oMr7R3Z-NTzFOOrRWh6xhV-Gdmiobi8fVDm7_-J0VT2w6Q_s74O9A5X_o14 |
| CitedBy_id | crossref_primary_10_1186_s13638_017_0947_7 crossref_primary_10_1155_2021_6638405 crossref_primary_10_1109_ACCESS_2018_2813998 crossref_primary_10_1109_JSAC_2018_2825818 |
| Cites_doi | 10.1109/TIT.2009.2021379 10.1109/ITW.2014.6970875 10.1109/TIT.2011.2162275 10.1109/ISIT.2014.6875037 10.1109/ISIT.2011.6034088 10.1109/MSP.2013.2260875 10.1109/TIT.2007.901143 10.1109/TIT.2008.921680 10.1137/S0895480103428338 10.1109/ITA.2010.5454148 10.1109/ISIT.2012.6283739 10.1109/MSP.2013.2265141 10.1109/ITW.2012.6404716 10.1109/TIT.2012.2201374 10.1109/ISIT.2011.6033992 10.1109/Allerton.2011.6120174 10.1109/TIT.2011.2170660 |
| ContentType | Journal Article |
| Copyright | The Institution of Engineering and Technology 2021 The Institution of Engineering and Technology |
| Copyright_xml | – notice: The Institution of Engineering and Technology – notice: 2021 The Institution of Engineering and Technology |
| DBID | AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
| DOI | 10.1049/iet-com.2015.0624 |
| DatabaseName | CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | CrossRef Technology Research Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1751-8636 |
| EndPage | 415 |
| ExternalDocumentID | 10_1049_iet_com_2015_0624 CMU2BF01550 |
| Genre | article |
| GroupedDBID | 0R 24P 29I 4IJ 5GY 6IK 8VB AAJGR ABPTK ACGFS ACIWK AENEX ALMA_UNASSIGNED_HOLDINGS BFFAM CS3 DU5 ESX HZ IFIPE IPLJI JAVBF LAI LOTEE LXI M43 MS NADUK NXXTH O9- OCL QWB RIE RNS RUI U5U UNMZH ZL0 ZZ .DC 0R~ 0ZK 1OC 2QL 4.4 6OB 8FE 8FG 96U AAHHS AAHJG ABJCF ABQXS ACCFJ ACCMX ACESK ACGFO ACXQS ADEYR AEEZP AEGXH AEQDE AFAZI AFKRA AIAGR AIWBW AJBDE ALUQN ARAPS AVUZU BENPR BGLVJ CCPQU EBS EJD F8P GOZPB GROUPED_DOAJ GRPMH HCIFZ HZ~ IAO ITC K1G L6V M7S MCNEO MS~ OK1 P62 PTHSS ROL S0W ~ZZ AAMMB AAYXX AEFGJ AFFHD AGXDD AIDQK AIDYY CITATION IDLOA PHGZM PHGZT PQGLB WIN 7SC 7SP 8FD JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c4010-4876f5e4d6d2ec20e5e5400ca423b08a0ba3a836f6d3025cb1de0b1312acfa373 |
| IEDL.DBID | 24P |
| ISICitedReferencesCount | 7 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000372208100008&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1751-8628 |
| IngestDate | Fri Sep 05 10:50:16 EDT 2025 Wed Oct 29 21:23:28 EDT 2025 Tue Nov 18 21:41:12 EST 2025 Wed Jan 22 16:30:53 EST 2025 Thu May 09 18:26:38 EDT 2019 Tue Jan 05 21:44:35 EST 2021 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 4 |
| Keywords | telecommunication security channel coding Tal–Sharov–Vardy implementation multiple-access wiretap channels 2-user Gaussian wiretap MAC channel multiuser channels optimisation cooperative jamming polar codes telecommunication network reliability multiple access channel legitimate receiver multi-access systems reliability criteria external eavesdropper Gaussian channels error statistics wireless systems discrete optimisation problem polar alignment cooperative security m-user MAC upper bound lower bound low-complexity suboptimal algorithm cooperative communication matrix algebra polynomial complexity deterministic binary matrices block error probability uniform sum secrecy rate maximization computational complexity |
| Language | English |
| License | http://onlinelibrary.wiley.com/termsAndConditions#vor |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c4010-4876f5e4d6d2ec20e5e5400ca423b08a0ba3a836f6d3025cb1de0b1312acfa373 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
| PQID | 1808109670 |
| PQPubID | 23500 |
| PageCount | 9 |
| ParticipantIDs | proquest_miscellaneous_1808109670 crossref_citationtrail_10_1049_iet_com_2015_0624 crossref_primary_10_1049_iet_com_2015_0624 wiley_primary_10_1049_iet_com_2015_0624_CMU2BF01550 iet_journals_10_1049_iet_com_2015_0624 |
| ProviderPackageCode | RUI |
| PublicationCentury | 2000 |
| PublicationDate | 2016-03-03 |
| PublicationDateYYYYMMDD | 2016-03-03 |
| PublicationDate_xml | – month: 03 year: 2016 text: 2016-03-03 day: 03 |
| PublicationDecade | 2010 |
| PublicationTitle | IET communications |
| PublicationYear | 2016 |
| Publisher | The Institution of Engineering and Technology |
| Publisher_xml | – name: The Institution of Engineering and Technology |
| References | Abbe, E.; Telatar, I.E. (C16) 2012; 58 Khachiyan, L.; Boros, E.; Elbassioni, K. (C15) 2006; 19 Arikan, E. (C14) 2009; 55 Mahdavifar, H.; Vardy, A. (C5) 2011; 57 Cheraghchi, M.; Didier, F.; Shokrollahi, A. (C7) 2012; 58 Harrison, W.K.; Almeida, J.; Bloch, M.R. (C8) 2013; 30 Bassily, R.; Ekrem, E.; He, X. (C1) 2013; 30 Tekin, E.; Yener, A. (C2) 2008; 54 Thangaraj, A.; Dihidar, S.; Calderbank, A.S. (C3) 2007; 53 2009; 55 2006; 19 2008; 54 2011; 57 2014 2007; 53 2012; 58 2012 2011 2010 2013; 30 2012; 7417 e_1_2_8_17_1 e_1_2_8_18_1 e_1_2_8_19_1 e_1_2_8_13_1 e_1_2_8_14_1 Bellare M. (e_1_2_8_7_1) 2012 e_1_2_8_15_1 e_1_2_8_16_1 e_1_2_8_3_1 e_1_2_8_2_1 e_1_2_8_5_1 e_1_2_8_4_1 e_1_2_8_6_1 e_1_2_8_9_1 e_1_2_8_8_1 e_1_2_8_20_1 e_1_2_8_10_1 e_1_2_8_11_1 e_1_2_8_12_1 |
| References_xml | – volume: 30 start-page: 41 issue: 5 year: 2013 end-page: 50 ident: C8 article-title: Coding for secrecy: an overview of error-control coding techniques for physical-layer security publication-title: IEEE Signal Process Mag., – volume: 53 start-page: 2933 issue: 8 year: 2007 end-page: 2945 ident: C3 article-title: Applications of LDPC codes to the wiretap channel publication-title: IEEE Trans. Inf. Theory – volume: 55 start-page: 3051 issue: 7 year: 2009 end-page: 3073 ident: C14 article-title: Channel polarization: a method for constructing capacity achieving codes for symmetric binary-input memoryless channels publication-title: IEEE Trans. Inf. Theory – volume: 54 start-page: 2735 issue: 6 year: 2008 end-page: 2751 ident: C2 article-title: The general Gaussian multiple-access and two-way wiretap channel: achievable rates and cooperative jamming publication-title: IEEE Trans. Inf. Theory – volume: 58 start-page: 5437 issue: 8 year: 2012 end-page: 5448 ident: C16 article-title: Polar codes for the m-user multiple access channel publication-title: IEEE Trans. Inf. Theory – volume: 30 start-page: 16 issue: 5 year: 2013 end-page: 28 ident: C1 article-title: Cooperative security at the physical layer: a summary of recent advances publication-title: IEEE Signal Process. Mag. – volume: 57 start-page: 6428 issue: 10 year: 2011 end-page: 6443 ident: C5 article-title: Achieving the secrecy capacity of wiretap channels using polar codes publication-title: IEEE Trans. Inf. Theory – volume: 58 start-page: 1254 issue: 2 year: 2012 end-page: 1274 ident: C7 article-title: Invertible extractors and wiretap protocols publication-title: IEEE Trans. Inf. Theory – volume: 19 start-page: 966 issue: 4 year: 2006 end-page: 984 ident: C15 article-title: On the complexity of some enumeration algorithms for matroids publication-title: SIAM J. Discrete Math. – start-page: 2132 year: 2012 end-page: 2136 – volume: 57 start-page: 6428 issue: 10 year: 2011 end-page: 6443 article-title: Achieving the secrecy capacity of wiretap channels using polar codes publication-title: IEEE Trans. Inf. Theory – start-page: 1271 year: 2014 end-page: 1275 – start-page: 1 year: 2010 end-page: 8 – volume: 54 start-page: 2735 issue: 6 year: 2008 end-page: 2751 article-title: The general Gaussian multiple‐access and two‐way wiretap channel: achievable rates and cooperative jamming publication-title: IEEE Trans. Inf. Theory – start-page: 240 year: 2011 end-page: 246 – start-page: 2393 year: 2011 end-page: 2397 – volume: 7417 start-page: 294 year: 2012 end-page: 331 – start-page: 466 year: 2014 end-page: 470 – volume: 58 start-page: 5437 issue: 8 year: 2012 end-page: 5448 article-title: Polar codes for the m‐user multiple access channel publication-title: IEEE Trans. Inf. Theory – start-page: 462 year: 2012 end-page: 466 – start-page: 71 year: 2010 end-page: 75 – volume: 19 start-page: 966 issue: 4 year: 2006 end-page: 984 article-title: On the complexity of some enumeration algorithms for matroids publication-title: SIAM J. Discrete Math. – volume: 30 start-page: 16 issue: 5 year: 2013 end-page: 28 article-title: Cooperative security at the physical layer: a summary of recent advances publication-title: IEEE Signal Process. Mag. – volume: 55 start-page: 3051 issue: 7 year: 2009 end-page: 3073 article-title: Channel polarization: a method for constructing capacity achieving codes for symmetric binary‐input memoryless channels publication-title: IEEE Trans. Inf. Theory – volume: 58 start-page: 1254 issue: 2 year: 2012 end-page: 1274 article-title: Invertible extractors and wiretap protocols publication-title: IEEE Trans. Inf. Theory – start-page: 2816 year: 2011 end-page: 2820 – volume: 30 start-page: 41 issue: 5 year: 2013 end-page: 50 article-title: Coding for secrecy: an overview of error‐control coding techniques for physical‐layer security publication-title: IEEE Signal Process Mag., – volume: 53 start-page: 2933 issue: 8 year: 2007 end-page: 2945 article-title: Applications of LDPC codes to the wiretap channel publication-title: IEEE Trans. Inf. Theory – ident: e_1_2_8_15_1 doi: 10.1109/TIT.2009.2021379 – start-page: 294 volume-title: Advances in Cryptology: CRYPTO (Lecture Notes in Computer Science) year: 2012 ident: e_1_2_8_7_1 – ident: e_1_2_8_11_1 doi: 10.1109/ITW.2014.6970875 – ident: e_1_2_8_6_1 doi: 10.1109/TIT.2011.2162275 – ident: e_1_2_8_20_1 doi: 10.1109/ISIT.2014.6875037 – ident: e_1_2_8_19_1 doi: 10.1109/ISIT.2011.6034088 – ident: e_1_2_8_2_1 doi: 10.1109/MSP.2013.2260875 – ident: e_1_2_8_4_1 doi: 10.1109/TIT.2007.901143 – ident: e_1_2_8_3_1 doi: 10.1109/TIT.2008.921680 – ident: e_1_2_8_16_1 doi: 10.1137/S0895480103428338 – ident: e_1_2_8_12_1 doi: 10.1109/ITA.2010.5454148 – ident: e_1_2_8_18_1 doi: 10.1109/ISIT.2012.6283739 – ident: e_1_2_8_9_1 doi: 10.1109/MSP.2013.2265141 – ident: e_1_2_8_10_1 doi: 10.1109/ITW.2012.6404716 – ident: e_1_2_8_17_1 doi: 10.1109/TIT.2012.2201374 – ident: e_1_2_8_13_1 – ident: e_1_2_8_5_1 doi: 10.1109/ISIT.2011.6033992 – ident: e_1_2_8_14_1 doi: 10.1109/Allerton.2011.6120174 – ident: e_1_2_8_8_1 doi: 10.1109/TIT.2011.2170660 |
| SSID | ssj0055644 |
| Score | 2.1082838 |
| Snippet | The authors study cooperative security in the physical layer of wireless systems based on the recently developed polar codes for multiple access channel (MAC).... |
| SourceID | proquest crossref wiley iet |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 407 |
| SubjectTerms | 2‐user Gaussian wiretap MAC channel Algorithms block error probability Blocking channel coding Channels Coding computational complexity cooperative communication cooperative jamming polar codes cooperative security deterministic binary matrices discrete optimisation problem error statistics Errors external eavesdropper Gaussian Gaussian channels legitimate receiver lower bound low‐complexity suboptimal algorithm matrix algebra multiple access channel multiple‐access wiretap channels multiuser channels multi‐access systems m‐user MAC optimisation Optimization polar alignment polynomial complexity reliability criteria Security Tal–Sharov–Vardy implementation telecommunication network reliability telecommunication security uniform sum secrecy rate maximization upper bound wireless systems |
| Title | Cooperative jamming polar codes for multiple-access wiretap channels |
| URI | http://digital-library.theiet.org/content/journals/10.1049/iet-com.2015.0624 https://onlinelibrary.wiley.com/doi/abs/10.1049%2Fiet-com.2015.0624 https://www.proquest.com/docview/1808109670 |
| Volume | 10 |
| WOSCitedRecordID | wos000372208100008&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVWIB databaseName: Wiley Online Library Free Content customDbUrl: eissn: 1751-8636 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0055644 issn: 1751-8628 databaseCode: WIN dateStart: 20130101 isFulltext: true titleUrlDefault: https://onlinelibrary.wiley.com providerName: Wiley-Blackwell – providerCode: PRVWIB databaseName: Wiley Online Library Open Access customDbUrl: eissn: 1751-8636 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0055644 issn: 1751-8628 databaseCode: 24P dateStart: 20130101 isFulltext: true titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html providerName: Wiley-Blackwell |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3NbtQwEB71hwM9QCmgLn8yVcUBKeDYieM9QtRVe-i2h1b0ZtnJRCqiu1F3y5lH4Bl5EmaczbYrpCIhLjk4Y8saz3i-8dgzAPs5C0KmTaIbLPi0yiY2s1XSpNb7nCxmrXwsNlGMx_biYni6BmX_FqbLD7E8cGPNiPs1K7gPXRUSArW0iJc4T_jCB1mw_IM0KluHzTTVBYu2yk777TjPTazoSmYyTQi-22Voc_jxjyFWjNM6_V7BnXfRazQ_o8f_ZeLb8GiBPsWnTlyewBpOdmDrTk7CpzAqp9MWu3zg4qu_uqJW0bIDLPj5-0wQyhX9NcRfP376WHFRcMrjuW8FPySmCc6ewfno4Kw8TBbFFpIq44A4OS6myTGrTa2wUhJzJDAnK094K0jrZfDaW20aU2vCSVVIa5Qh1anyVeN1oZ_DxmQ6wV0QSgZUwZoiDDngbAJynj2LmAbMCC8NQPZcdtUiEzkXxPjmYkQ8GzpikSMWOWaRYxYN4P2yS9ul4biP-B23LZRxdh_h3grh0cGZK0-ObwlcWzcDeNuLgCPV43iKn-D0hsblqiXkAhZyADqu-N_n5srjc_V5FD3DF__U6yU8pHYT78HpV7Axv77B1_Cg-j6_nF2_ibJP3y9H499A_wZj |
| linkProvider | Wiley-Blackwell |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3NbhMxEB71Bwk4UH5FWgoGIQ5IS7221-scIW3Uiib0kEq9WfauV2pFk1WTcuYReMY-SWe82dCoUpFQr96xZc16PN947G8APma0EJTUiaxCTqdVJjHKFEmVGucy9JilcLHYRD4cmpOT7tEK7LZvYRp-iMWBG1lG3K_JwOlAugk4FZFknoZZQjc-0IVlX7gWahXWFXobqmMg1FG7H2eZjiVd0U-mCeJ3s8htdnduDbHknVbx8xLwvAlfo__pb9zPzJ_Ckzn-ZF-bBfMMVsL4OTy-wUr4Avq9yaQODSM4O3Pn59jKagqBGT2AnzLEuay9iHj1-4-LNRcZkR7PXM3oKTHOcPoSjvt7o95-Mi-3kBSKUuIYuugqC6rUpQiF4CELCOd44RBxeW4c9046I3WlS4lIqfBpGbhPZSpcUTmZy1ewNp6Mw2tggvsgvNG571LKWftATHsmhNQHhYipA7xVsy3mXORUEuOnjTlx1bWoIosqsqQiSyrqwOdFl7oh4rhL-BO1zc1xepfghyXBg72R7f0Y_BWwdVl14H27BiwaH2VU3DhMLnFcqluCQWDOOyDjL__33GxvcCy-9WNsuPlfvd7Bw_3R4NAeHgy_b8EjlNHxVpx8A2uzi8uwDQ-KX7PT6cXbaAjXniIJNg |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3NbtQwEB61BaFy4L9i-TUIcUBKcWLH8R5h24gKuuyhlXqz7GQiFdHdqLvlzCPwjDwJM85m6QqpSIirM7asscfzTcb-BuBVzhtBK5OoBgv-W2UTq22VNKn1PiePWWc-FpsoxmN7cjKcbMBe_xam44dY_XBjy4jnNRs4tnXTBZyaSTJPcZHwjQ9yYfmuNJnehGs6p7OW-Z31pD-P89zEkq7kJ9OE8Ltd5TaHb_8YYs07bdLnNeB5Gb5G_1Pe_j8zvwO3lvhTvOs2zF3YwOk9uHmJlfA-lKPZrMWOEVx88Wdn1CpaDoEFP4CfC8K5or-I-PP7Dx9rLgomPV74VvBTYprh_AEcl_tHow_JstxCUmlOiVPoYpocdW3qDKtMYo4E52TlCXEFab0MXnmrTGNqRUipCmmNMqQqzXzVeFWoHdiazqb4EEQmA2bBmiIMOeVsAjLTnkVMA2pCTAOQvZpdteQi55IYX13MieuhIxU5UpFjFTlW0QDerLq0HRHHVcKvuW1pjvOrBF-uCR7sH7nR58PfAo5WbgAv-j3gyPg4o-KnOLugcbluCQWBhRyAikv-97m50eFx9r6MseGjf-r1HG5M9kr36WD88TFsk4iJl-LUE9hanF_gU7hefVuczs-fRTv4BTZtCLo |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cooperative+jamming+polar+codes+for+multiple-access+wiretap+channels&rft.jtitle=IET+communications&rft.au=Hajimomeni%2C+Mona&rft.au=Aghaeinia%2C+Hassan&rft.au=Kim%2C+Il-Min&rft.au=Kim%2C+Kwihoon&rft.date=2016-03-03&rft.issn=1751-8628&rft.eissn=1751-8636&rft.volume=10&rft.issue=4&rft.spage=407&rft.epage=415&rft_id=info:doi/10.1049%2Fiet-com.2015.0624&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1751-8628&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1751-8628&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1751-8628&client=summon |