Analysis and Research on Secondary LT Coding Anti-Eavesdropping Scheme Based on LT Code Degree-1

Fountain code can significantly increase eavesdroppers’ untranslated efficiency in the wireless communication eavesdropping channel. The secondary LT coding anti-eavesdropping scheme with fountain code degree-1 is the subject of a theoretical investigation in this paper. The fact that its channel se...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Applied sciences Ročník 13; číslo 20; s. 11296
Hlavní autoři: Wang, Lizheng, Niu, Fanglin, Jin, Jingjing, Yu, Ling
Médium: Journal Article
Jazyk:angličtina
Vydáno: Basel MDPI AG 01.10.2023
Témata:
ISSN:2076-3417, 2076-3417
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract Fountain code can significantly increase eavesdroppers’ untranslated efficiency in the wireless communication eavesdropping channel. The secondary LT coding anti-eavesdropping scheme with fountain code degree-1 is the subject of a theoretical investigation in this paper. The fact that its channel security capacity is greater than that of traditional LT code is first deduced from an information-theoretic standpoint, and the impact of source symbol length on decoding complexity and decoding overhead is then examined. The experimental results show that, compared with the traditional anti-eavesdropping twice fountain code, selecting long source symbols for double LT coding, when the main channel is better than the eavesdropping channel, can ensure that the eavesdropper has a higher untranslated efficiency, and can effectively reduce the fountain code decoding complexity and the number of encoded symbols sent by the source to improve the efficiency of information transmission.
AbstractList Fountain code can significantly increase eavesdroppers’ untranslated efficiency in the wireless communication eavesdropping channel. The secondary LT coding anti-eavesdropping scheme with fountain code degree-1 is the subject of a theoretical investigation in this paper. The fact that its channel security capacity is greater than that of traditional LT code is first deduced from an information-theoretic standpoint, and the impact of source symbol length on decoding complexity and decoding overhead is then examined. The experimental results show that, compared with the traditional anti-eavesdropping twice fountain code, selecting long source symbols for double LT coding, when the main channel is better than the eavesdropping channel, can ensure that the eavesdropper has a higher untranslated efficiency, and can effectively reduce the fountain code decoding complexity and the number of encoded symbols sent by the source to improve the efficiency of information transmission.
Audience Academic
Author Niu, Fanglin
Wang, Lizheng
Yu, Ling
Jin, Jingjing
Author_xml – sequence: 1
  givenname: Lizheng
  surname: Wang
  fullname: Wang, Lizheng
– sequence: 2
  givenname: Fanglin
  surname: Niu
  fullname: Niu, Fanglin
– sequence: 3
  givenname: Jingjing
  surname: Jin
  fullname: Jin, Jingjing
– sequence: 4
  givenname: Ling
  surname: Yu
  fullname: Yu, Ling
BookMark eNptkV1LHDEUhkNRqFrv_AGB3nY0HzOTzOV2_aiwUKh6Hc8kZ9Ysu8mYjAX_fbOdIlJMLhJenvc9h3OOyUGIAQk54-xcyo5dwDhyKRjnoms_kSPBVFvJmquDd__P5DTnDSun41JzdkQeFwG2r9lnCsHRX5gRkn2iMdA7tDE4SK90dU-X0fmwposw-eoKfmN2KY7jXrqzT7hD-h0yur1thpFe4johVvwLORxgm_H033tCHq6v7pc_qtXPm9vlYlXZmrVT1dc91rblGjrUvWIc7dD0ztqm41pZ4NBa4RruhKoHAfVQ94BC9-CUgBYHeUJu51wXYWPG5HeldRPBm79CTGsDafJ2i6ZrWC90wxRXsraq0Q4001w4ZiUy2ZSsr3PWmOLzC-bJbOJLKoPKRmgtpFaqZYU6n6k1lFAfhjglsOU63PkyOxx80RdK8Y51s-HbbLAp5pxweGuTM7PfoXm_w4KL_3DrJ5h8DKWO335s-gNMT563
CitedBy_id crossref_primary_10_3390_s25020460
Cites_doi 10.1109/TCOMM.2020.2997400
10.1109/ACCESS.2022.3178811
10.1109/TCOMM.2022.3178764
10.1109/MCOM.2015.7295483
10.1109/LWC.2022.3147601
10.1002/j.1538-7305.1975.tb02040.x
10.1109/TIT.2009.2032814
10.1109/TII.2015.2509442
10.1109/TIT.2016.2570232
10.1109/TIT.2008.921678
10.1109/SURV.2012.020212.00049
10.1109/LCOMM.2016.2574355
10.1109/LCOMM.2019.2915670
10.3390/sym14102026
10.1109/INFCOM.2009.5062099
10.1007/s11276-016-1318-8
10.1049/cmu2.12503
10.1049/iet-com.2013.1033
10.1002/j.1538-7305.1949.tb00928.x
ContentType Journal Article
Copyright COPYRIGHT 2023 MDPI AG
2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: COPYRIGHT 2023 MDPI AG
– notice: 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID AAYXX
CITATION
ABUWG
AFKRA
AZQEC
BENPR
CCPQU
DWQXO
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQQKQ
PQUKI
PRINS
DOA
DOI 10.3390/app132011296
DatabaseName CrossRef
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
ProQuest Central Essentials
ProQuest Central
ProQuest One Community College
ProQuest Central
ProQuest Central Premium
ProQuest One Academic (New)
ProQuest Publicly Available Content
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central China
Directory of Open Access Journals
DatabaseTitle CrossRef
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest Central Essentials
ProQuest One Academic Eastern Edition
ProQuest Central (Alumni Edition)
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest One Academic UKI Edition
ProQuest Central Korea
ProQuest Central (New)
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList CrossRef


Publicly Available Content Database
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: PIMPY
  name: Publicly Available Content Database
  url: http://search.proquest.com/publiccontent
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Sciences (General)
EISSN 2076-3417
ExternalDocumentID oai_doaj_org_article_950b285071734c758da80812d0c3e035
A771909760
10_3390_app132011296
GroupedDBID .4S
2XV
5VS
7XC
8CJ
8FE
8FG
8FH
AADQD
AAFWJ
AAYXX
ADBBV
ADMLS
AFFHD
AFKRA
AFPKN
AFZYC
ALMA_UNASSIGNED_HOLDINGS
APEBS
ARCSS
BCNDV
BENPR
CCPQU
CITATION
CZ9
D1I
D1J
D1K
GROUPED_DOAJ
IAO
IGS
ITC
K6-
K6V
KC.
KQ8
L6V
LK5
LK8
M7R
MODMG
M~E
OK1
P62
PHGZM
PHGZT
PIMPY
PROAC
TUS
ABUWG
AZQEC
DWQXO
PKEHL
PQEST
PQQKQ
PQUKI
PRINS
ID FETCH-LOGICAL-c406t-b4be4c618a9e8b701ecf5bdcc59187ca1a6c2d51d274f2a4f4bae28bad72a6ef3
IEDL.DBID BENPR
ISICitedReferencesCount 1
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001090587900001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 2076-3417
IngestDate Mon Nov 10 04:32:54 EST 2025
Sun Nov 09 07:19:35 EST 2025
Tue Nov 04 18:42:25 EST 2025
Tue Nov 18 22:29:50 EST 2025
Sat Nov 29 07:14:35 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 20
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c406t-b4be4c618a9e8b701ecf5bdcc59187ca1a6c2d51d274f2a4f4bae28bad72a6ef3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
OpenAccessLink https://www.proquest.com/docview/2882387760?pq-origsite=%requestingapplication%
PQID 2882387760
PQPubID 2032433
ParticipantIDs doaj_primary_oai_doaj_org_article_950b285071734c758da80812d0c3e035
proquest_journals_2882387760
gale_infotracacademiconefile_A771909760
crossref_primary_10_3390_app132011296
crossref_citationtrail_10_3390_app132011296
PublicationCentury 2000
PublicationDate 2023-10-01
PublicationDateYYYYMMDD 2023-10-01
PublicationDate_xml – month: 10
  year: 2023
  text: 2023-10-01
  day: 01
PublicationDecade 2020
PublicationPlace Basel
PublicationPlace_xml – name: Basel
PublicationTitle Applied sciences
PublicationYear 2023
Publisher MDPI AG
Publisher_xml – name: MDPI AG
References Yi (ref_9) 2014; 8
Kasban (ref_12) 2022; 16
Liang (ref_3) 2008; 54
Zhang (ref_22) 2022; 10
Peng (ref_8) 2022; 11
Wyner (ref_2) 1975; 54
Kumar (ref_10) 2016; 20
ref_11
Cai (ref_19) 2019; 23
Liu (ref_14) 2022; 70
Bi (ref_6) 2015; 53
Hashemi (ref_18) 2016; 62
Jin (ref_23) 2021; 34
Shannon (ref_1) 1949; 28
Feng (ref_5) 2012; 15
Sarma (ref_7) 2018; 24
ref_16
ref_15
Zhang (ref_21) 2022; 2022
Ardestanizadeh (ref_4) 2009; 55
Sun (ref_13) 2015; 12
Huang (ref_20) 2020; 68
Sun (ref_17) 2014; 42
References_xml – volume: 42
  start-page: 1918
  year: 2014
  ident: ref_17
  article-title: A Novel Encoding Scheme for Regular Variable-Node Degree LT Codes
  publication-title: Acta Electron. Sin.
– volume: 68
  start-page: 5313
  year: 2020
  ident: ref_20
  article-title: Design and analysis of online fountain codes for intermediate performance
  publication-title: IEEE Trans. Commun.
  doi: 10.1109/TCOMM.2020.2997400
– volume: 10
  start-page: 57880
  year: 2022
  ident: ref_22
  article-title: Design of Anti-Eavesdropping Scheme for SLT-LT Codes Based on Random Symbol Sets
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2022.3178811
– volume: 70
  start-page: 4327
  year: 2022
  ident: ref_14
  article-title: ROFC-LF: Recursive Online Fountain Code With Limited Feedback for Underwater Acoustic Networks
  publication-title: IEEE Trans. Commun.
  doi: 10.1109/TCOMM.2022.3178764
– volume: 53
  start-page: 190
  year: 2015
  ident: ref_6
  article-title: Wireless communications in the era of big data
  publication-title: IEEE Commun. Mag.
  doi: 10.1109/MCOM.2015.7295483
– volume: 11
  start-page: 851
  year: 2022
  ident: ref_8
  article-title: Opportunistic Fountain Coding with Coordinative Routing
  publication-title: IEEE Wirel. Commun. Lett.
  doi: 10.1109/LWC.2022.3147601
– volume: 54
  start-page: 1355
  year: 1975
  ident: ref_2
  article-title: The wire-tap channel
  publication-title: Bell Syst. Tech. J.
  doi: 10.1002/j.1538-7305.1975.tb02040.x
– volume: 55
  start-page: 5353
  year: 2009
  ident: ref_4
  article-title: Wiretap channel with secure rate-limited feedback
  publication-title: IEEE Trans. Inf. Theory
  doi: 10.1109/TIT.2009.2032814
– volume: 12
  start-page: 291
  year: 2015
  ident: ref_13
  article-title: Fountain-coding aided strategy for secure cooperative transmission in industrial wireless sensor networks
  publication-title: IEEE Trans. Ind. Inform.
  doi: 10.1109/TII.2015.2509442
– ident: ref_15
– volume: 62
  start-page: 4054
  year: 2016
  ident: ref_18
  article-title: Fountain codes with nonuniform selection distributions through feedback
  publication-title: IEEE Trans. Inf. Theory
  doi: 10.1109/TIT.2016.2570232
– volume: 54
  start-page: 2470
  year: 2008
  ident: ref_3
  article-title: Secure communication over fading channels
  publication-title: IEEE Trans. Inf. Theory
  doi: 10.1109/TIT.2008.921678
– volume: 15
  start-page: 167
  year: 2012
  ident: ref_5
  article-title: A survey of energy-efficient wireless communications
  publication-title: IEEE Commun. Surv. Tutor.
  doi: 10.1109/SURV.2012.020212.00049
– volume: 2022
  start-page: 6106786
  year: 2022
  ident: ref_21
  article-title: LT Codes with Double Encoding Matrix Reorder Physical Layer Secure Transmission
  publication-title: J. Sens.
– volume: 20
  start-page: 1491
  year: 2016
  ident: ref_10
  article-title: Secure repairable fountain codes
  publication-title: IEEE Commun. Lett.
  doi: 10.1109/LCOMM.2016.2574355
– volume: 23
  start-page: 1136
  year: 2019
  ident: ref_19
  article-title: Online fountain codes with unequal recovery time
  publication-title: IEEE Commun. Lett.
  doi: 10.1109/LCOMM.2019.2915670
– ident: ref_11
  doi: 10.3390/sym14102026
– ident: ref_16
  doi: 10.1109/INFCOM.2009.5062099
– volume: 34
  start-page: 51
  year: 2021
  ident: ref_23
  article-title: Design of secondary LT code information security Transmission based on the symbols of degree 1
  publication-title: Chang. Inf. Commun.
– volume: 24
  start-page: 127
  year: 2018
  ident: ref_7
  article-title: SNR based secure communication via untrusted amplify-and-forward relay nodes using artificial noise
  publication-title: Wirel. Netw.
  doi: 10.1007/s11276-016-1318-8
– volume: 16
  start-page: 2479
  year: 2022
  ident: ref_12
  article-title: Performance enhancing of MIMO-OFDM system utilizing different interleaving techniques with rate-less fountain raptor code
  publication-title: IET Commun.
  doi: 10.1049/cmu2.12503
– volume: 8
  start-page: 2476
  year: 2014
  ident: ref_9
  article-title: Achieving strong security based on fountain code with coset pre-coding
  publication-title: IET Commun.
  doi: 10.1049/iet-com.2013.1033
– volume: 28
  start-page: 656
  year: 1949
  ident: ref_1
  article-title: Communication theory of secrecy systems
  publication-title: Bell Syst. Tech. J.
  doi: 10.1002/j.1538-7305.1949.tb00928.x
SSID ssj0000913810
Score 2.2688055
Snippet Fountain code can significantly increase eavesdroppers’ untranslated efficiency in the wireless communication eavesdropping channel. The secondary LT coding...
SourceID doaj
proquest
gale
crossref
SourceType Open Website
Aggregation Database
Enrichment Source
Index Database
StartPage 11296
SubjectTerms Analysis
anti-eavesdropping
Codes
delete channel
eavesdropping channel
Efficiency
Electronic surveillance
Energy consumption
Information management
Information theory
LT code
physical layer security
Safety and security measures
Signal to noise ratio
Wireless communications
Wireless networks
SummonAdditionalLinks – databaseName: Directory of Open Access Journals
  dbid: DOA
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3NaxQxFA-leKgH6YfiapUcLFVkcJJJJslxW1s8SCm0Qm8xHy9SqLOyuy343_vezGxZD6WXXmdeIHkfee9Hkt9j7EOGmE1dYhWsTghQoqyiFm0VVakVFKsllL7ZhDk7s1dX7nyt1RfdCRvogQfFfXEax1vdnxarhNVtDtQsQuY6NVA3PXtpbdwamOr3YCeIumq46d4grqfzYHotTOVF-18O6qn6H9qQ-yxzus1ejOUhnw7T2mEb0O2y52ukgbtsZwzHBf84ckZ_2mM_V-QiPHSZr67T8VnHLwjx5jD_y79f8uMZpSo-7ZbX1Um4g0Wez4ig4Re_QOP9Bn6ESS3TsEEY-FdAQA6VeMl-nJ5cHn-rxuYJVcIcvURlR1CpFTY4sNHUAlLRMaeknbAmBRHaJLMWGWFpkUEVFQNIG0M2MrRQmldss5t18Jpx0-YUXVYgTa2ULhaywMAtrmC0R1dP2OeVOn0amcWpwcWNR4RByvfryp-wg3vpPwOjxgNyR2SZexniwe4_oHf40Tv8Y94xYYdkV0_RilNKYXx0gAsj3is_NQYrIizJcBH7K9P7MYwXXiL-aKzB32-eYjZv2RZ1qx_uAu6zzeX8Ft6xZ-lueb2Yv-89-B_wQvHW
  priority: 102
  providerName: Directory of Open Access Journals
Title Analysis and Research on Secondary LT Coding Anti-Eavesdropping Scheme Based on LT Code Degree-1
URI https://www.proquest.com/docview/2882387760
https://doaj.org/article/950b285071734c758da80812d0c3e035
Volume 13
WOSCitedRecordID wos001090587900001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 2076-3417
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000913810
  issn: 2076-3417
  databaseCode: DOA
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2076-3417
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000913810
  issn: 2076-3417
  databaseCode: M~E
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 2076-3417
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000913810
  issn: 2076-3417
  databaseCode: BENPR
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Publicly Available Content Database
  customDbUrl:
  eissn: 2076-3417
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000913810
  issn: 2076-3417
  databaseCode: PIMPY
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/publiccontent
  providerName: ProQuest
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Lb9QwELag5UAPlBZQF9rKBxAgFJGXY-eEdstWIMFqRYtUTsGPcVUJkpIslfj3zCTOUg7lwjHJRLI1n-dhj79h7KkD42TsTaSVsJigmDQyIikik_s4B69ECr5vNiEXC3V2Vi7DhlsXyipHm9gbatdY2iN_nWIomCkpi_jN5Y-IukbR6WpooXGbbRJTGeJ8czZfLD-td1mI9VIl8VDxnmF-T-fCdGuYwoziL1_UU_bfZJh7b3O8_b_jvM_uhTiTTwdg7LBbUO-yrWvsg7tsJ6zrjr8I5NMvH7CvI0sJ17XjY10eb2p-Qqmz0-0v_uGUHzXk8_i0Xl1Ec30FnWsbYno45yeIgu_AZ-gdHf02CAN_C5jZQ5Q8ZJ-P56dH76LQhSGy6OxXqDUDuS0SpUtQRsYJWC-Ms1aUiZJWJ7qwqROJw_zWpzr3udGQKqOdTHUBPnvENuqmhj3GZeGsKV0OqYzzXHgFDrVW-NKj2TBlPGGvRn1UNlCUU6eMbxWmKqS96rr2JuzZWvpyoOa4QW5Gql3LEKF2_6Jpz6uwPqtSIEyV6IsScotJlNPUkyR1sc0gzsSEPSdgVLTscUhWh9sLODEi0KqmUmJohbEdTmJ_BEYV7EFX_UHF439_fsLuUkP7oVxwn22s2p9wwO7Yq9VF1x4GeB_2Owf4tHz_cfnlN9H6Bdw
linkProvider ProQuest
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwELbKFgk4AC2gLhTwgQoQikich50DQtuXuup2tVIXqZxcP8arSiUp2aWof4rfiCePpRzKrQeuiRPF8edvZuzxN4S8saAtD50OlEiND1A0C3QaZYFOXJiAEykDVxeb4OOxODnJJyvkV3cWBtMqO06sidqWBtfIPzLvCsaC8yz8fPE9wKpRuLvaldBoYHEIVz99yDb_NNz147vF2P7edOcgaKsKBMYbr4X_Cg2JySKhchCahxEYl2prTJpHghsVqcwwm0bWx2uOqcQlWgETWlnOVAYu9u-9Q1YTBHuPrE6GR5Ovy1UdVNkUUdhk2MdxHuI-NJ5SRrcm-8v21SUCbjIEtXXbf_S__ZfH5GHrR9NBA_w1sgLFOnlwTV1xnay1vDWn71px7fdPyGmnwkJVYWmXd0jLgh7j0oBV1RUdTelOiTadDorFWbCnLmFuqxKVLGb02KP8G9Btb_0tPtY0BroLswogiJ6SL7fS72ekV5QFbBDKM2t0bhNgPEyS1AmwkWc4lztPizoP--RDN_7StBLsWAnkXPpQDNEir6OlT7aWrS8a6ZEb2m0jlJZtUDC8vlBWM9nyj8xTPw1FWiddJMYHiVZhzRVmQxNDGKd98haBKJHW_CcZ1Z7O8B1DgTA54Ny7jt539Z3Y7IAoW76byz8ofP7v26_JvYPp0UiOhuPDF-Q-8y5jkxq5SXqL6ge8JHfN5eJsXr1qpxYlp7eN2t-Z02RX
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwELbKFiE4AC0gFgr4QAUIRXWch51DVW27XbFqWa3UIrWn1I_xqhIkJbsU9a_x6xjnsZRDufXANXEiO_n8zYw9_oaQtxa0FczpQMnEYICieaCTMA107FgMTiYcXF1sQkwm8uQkm66QX91ZGJ9W2XFiTdS2NH6NfIujKxhJIVK25dq0iOlwtHPxPfAVpPxOa1dOo4HIAVz9xPBtvj0e4r_e5Hy0f7z3KWgrDAQGDdkCe6QhNmkoVQZSCxaCcYm2xiRZKIVRoUoNt0loMXZzXMUu1gq41MoKrlJwEb73DllFlzzmPbI6HX-eni5XeLzipgxZk20fRRnze9L-xLJ3cdK_7GBdLuAmo1BbutGj__kbPSYPW_-aDpoJsUZWoFgnD66pLq6TtZbP5vR9K7r94Qk569RZqCos7fIRaVnQI79kYFV1RQ-P6V7pbT0dFIvzYF9dwtxWpVe4mNEjRP83oLvoFVj_WNMY6BBmFUAQPiVfbmXcz0ivKAt4TqhIrdGZjYELFseJk2BDZD6XOaRLnbE--dhhITetNLuvEPI1xxDNIye_jpw-2Vy2vmgkSW5ot-thtWzjhcTrC2U1y1teyrMEp6dM6mSM2GDwaJWvxcItMxGwKOmTdx6Uuac77JJR7akNHJgXDssHQqBLiT4tDmKjA2Xe8uA8_4PIF_--_YbcQ6jmh-PJwUtyn6Mn2WRMbpDeovoBr8hdc7k4n1ev21lGydltg_Y3RMJtFw
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Analysis+and+Research+on+Secondary+LT+Coding+Anti-Eavesdropping+Scheme+Based+on+LT+Code+Degree-1&rft.jtitle=Applied+sciences&rft.au=Wang%2C+Lizheng&rft.au=Niu%2C+Fanglin&rft.au=Jin%2C+Jingjing&rft.au=Yu%2C+Ling&rft.date=2023-10-01&rft.pub=MDPI+AG&rft.eissn=2076-3417&rft.volume=13&rft.issue=20&rft.spage=11296&rft_id=info:doi/10.3390%2Fapp132011296&rft.externalDBID=HAS_PDF_LINK
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2076-3417&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2076-3417&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2076-3417&client=summon