Secrecy Capacity-Memory Tradeoff of Erasure Broadcast Channels
This paper derives upper and lower bounds on the secrecy capacity-memory tradeoff of a wiretap erasure broadcast channel (BC) with <inline-formula> <tex-math notation="LaTeX">{\mathsf{K}}_{w} </tex-math></inline-formula> weak receivers and <inline-formula> <...
Saved in:
| Published in | IEEE transactions on information theory Vol. 65; no. 8; pp. 5094 - 5124 |
|---|---|
| Main Authors | , , , |
| Format | Journal Article |
| Language | English |
| Published |
New York
IEEE
01.08.2019
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Institute of Electrical and Electronics Engineers |
| Subjects | |
| Online Access | Get full text |
| ISSN | 0018-9448 1557-9654 1557-9654 |
| DOI | 10.1109/TIT.2019.2902578 |
Cover
| Abstract | This paper derives upper and lower bounds on the secrecy capacity-memory tradeoff of a wiretap erasure broadcast channel (BC) with <inline-formula> <tex-math notation="LaTeX">{\mathsf{K}}_{w} </tex-math></inline-formula> weak receivers and <inline-formula> <tex-math notation="LaTeX">{\mathsf {K}}_{s} </tex-math></inline-formula> strong receivers, where weak receivers and strong receivers have the same erasure probabilities and cache sizes, respectively. The lower bounds are achieved by the schemes that meticulously combine joint cache-channel coding with wiretap coding and key-aided one-time pads. The presented upper bound holds more generally for arbitrary degraded BCs and arbitrary cache sizes. When only weak receivers have cache memories, upper and lower bounds coincide for small and large cache memories, thus providing the exact secrecy capacity-memory tradeoff for this setup. The derived bounds further allow us to conclude that the secrecy capacity is positive even when the eavesdropper is stronger than all the legitimate receivers with cache memories. Moreover, they show that the secrecy capacity-memory tradeoff can be significantly smaller than its non-secure counterpart, but it grows much faster when cache memories are small. This paper also presents a lower bound on the global secrecy capacity-memory tradeoff where one is allowed to optimize the cache assignment subject to a total cache budget. It is close to the best known lower bound without secrecy constraint. For small total cache budget, the global secrecy capacity-memory tradeoff is achieved by assigning all the available cache memory uniformly over all the receivers if the eavesdropper is stronger than all the legitimate receivers, and it is achieved by assigning the cache memory uniformly only over the weak receivers if the eavesdropper is weaker than the strong receivers. |
|---|---|
| AbstractList | This paper derives upper and lower bounds on the secrecy capacity-memory tradeoff of a wiretap erasure broadcast channel (BC) with <inline-formula> <tex-math notation="LaTeX">{\mathsf{K}}_{w} </tex-math></inline-formula> weak receivers and <inline-formula> <tex-math notation="LaTeX">{\mathsf {K}}_{s} </tex-math></inline-formula> strong receivers, where weak receivers and strong receivers have the same erasure probabilities and cache sizes, respectively. The lower bounds are achieved by the schemes that meticulously combine joint cache-channel coding with wiretap coding and key-aided one-time pads. The presented upper bound holds more generally for arbitrary degraded BCs and arbitrary cache sizes. When only weak receivers have cache memories, upper and lower bounds coincide for small and large cache memories, thus providing the exact secrecy capacity-memory tradeoff for this setup. The derived bounds further allow us to conclude that the secrecy capacity is positive even when the eavesdropper is stronger than all the legitimate receivers with cache memories. Moreover, they show that the secrecy capacity-memory tradeoff can be significantly smaller than its non-secure counterpart, but it grows much faster when cache memories are small. This paper also presents a lower bound on the global secrecy capacity-memory tradeoff where one is allowed to optimize the cache assignment subject to a total cache budget. It is close to the best known lower bound without secrecy constraint. For small total cache budget, the global secrecy capacity-memory tradeoff is achieved by assigning all the available cache memory uniformly over all the receivers if the eavesdropper is stronger than all the legitimate receivers, and it is achieved by assigning the cache memory uniformly only over the weak receivers if the eavesdropper is weaker than the strong receivers. This paper derives upper and lower bounds on the secrecy capacity-memory tradeoff of a wiretap erasure broadcast channel (BC) with [Formula Omitted] weak receivers and [Formula Omitted] strong receivers, where weak receivers and strong receivers have the same erasure probabilities and cache sizes, respectively. The lower bounds are achieved by the schemes that meticulously combine joint cache-channel coding with wiretap coding and key-aided one-time pads. The presented upper bound holds more generally for arbitrary degraded BCs and arbitrary cache sizes. When only weak receivers have cache memories, upper and lower bounds coincide for small and large cache memories, thus providing the exact secrecy capacity-memory tradeoff for this setup. The derived bounds further allow us to conclude that the secrecy capacity is positive even when the eavesdropper is stronger than all the legitimate receivers with cache memories. Moreover, they show that the secrecy capacity-memory tradeoff can be significantly smaller than its non-secure counterpart, but it grows much faster when cache memories are small. This paper also presents a lower bound on the global secrecy capacity-memory tradeoff where one is allowed to optimize the cache assignment subject to a total cache budget. It is close to the best known lower bound without secrecy constraint. For small total cache budget, the global secrecy capacity-memory tradeoff is achieved by assigning all the available cache memory uniformly over all the receivers if the eavesdropper is stronger than all the legitimate receivers, and it is achieved by assigning the cache memory uniformly only over the weak receivers if the eavesdropper is weaker than the strong receivers. This paper derives upper and lower bounds on the secrecy capacity-memory tradeoff of a wiretap erasure broadcast channel (BC) with K w weak receivers and K s strong receivers, where weak receivers and strong receivers have the same erasure probabilities and cache sizes, respectively. The lower bounds are achieved by the schemes that meticulously combine joint cache-channel coding with wiretap coding and key-aided one-time pads. The presented upper bound holds more generally for arbitrary degraded BCs and arbitrary cache sizes. When only weak receivers have cache memories, upper and lower bounds coincide for small and large cache memories, thus providing the exact secrecy capacity-memory tradeoff for this setup. The derived bounds further allow us to conclude that the secrecy capacity is positive even when the eavesdropper is stronger than all the legitimate receivers with cache memories. Moreover, they show that the secrecy capacity-memory tradeoff can be significantly smaller than its non-secure counterpart, but it grows much faster when cache memories are small. This paper also presents a lower bound on the global secrecy capacity-memory tradeoff where one is allowed to optimize the cache assignment subject to a total cache budget. It is close to the best known lower bound without secrecy constraint. For small total cache budget, the global secrecy capacity-memory tradeoff is achieved by assigning all the available cache memory uniformly over all the receivers if the eavesdropper is stronger than all the legitimate receivers, and it is achieved by assigning the cache memory uniformly only over the weak receivers if the eavesdropper is weaker than the strong receivers. |
| Author | Wigger, Michele Kamel, Sarah Rekaya-Ben Othman, Ghaya Sarkiss, Mireille |
| Author_xml | – sequence: 1 givenname: Sarah orcidid: 0000-0003-2230-3857 surname: Kamel fullname: Kamel, Sarah email: sarah.kamel@huawei.com organization: LTCI, Telecom ParisTech, Paris, France – sequence: 2 givenname: Mireille orcidid: 0000-0002-8359-5921 surname: Sarkiss fullname: Sarkiss, Mireille email: mireille.sarkiss@telecom-sudparis.eu organization: LIST, Communicating Systems Laboratory, BC 173, CEA, Gif-sur-Yvette, Frances – sequence: 3 givenname: Michele orcidid: 0000-0002-6737-5427 surname: Wigger fullname: Wigger, Michele email: michele.wigger@telecom-paristech.fr organization: LTCI, Telecom ParisTech, Paris, France – sequence: 4 givenname: Ghaya surname: Rekaya-Ben Othman fullname: Rekaya-Ben Othman, Ghaya email: ghaya.rekaya@telecom-paristech.fr organization: LTCI, Telecom ParisTech, Paris, France |
| BackLink | https://hal.science/hal-02440815$$DView record in HAL |
| BookMark | eNptkUtLxDAURoMoOD72gpuCKxcdk-a9EXTwBSMuHNfhTnqLldqMSUfpv7dDRWFwEULCOeG7Xw7IbhtaJOSE0Slj1F4sHhbTgjI7LSwtpDY7ZMKk1LlVUuySCaXM5FYIs08OUnobjkKyYkIun9FH9H02gxX4uuvzR3wPsc8WEUoMVZWFKruJkNYRs-sYoPSQumz2Cm2LTToiexU0CY9_9kPycnuzmN3n86e7h9nVPPdc6S4vBKAWDHzJK8NLU3HuteEGsNRq6Q2CVZYuS6YrQ7nZrFIKjVBysNIs-SFh47vrdgX9FzSNW8X6HWLvGHWbAlxXd25TgPspYHDOR-cV_ugAtbu_mrvNHS2EoIbJTzawZyO7iuFjjalzb2Ed22EkVxSKGaMEUwOlRsrHkFLEyg2NQVeHtotQN79Rhr_YjkK3xO30_yino1Ij4i9ulNRWSP4N9kCTDQ |
| CODEN | IETTAW |
| CitedBy_id | crossref_primary_10_1109_TIT_2020_3036313 crossref_primary_10_1109_JSAIT_2021_3054663 crossref_primary_10_1109_TIT_2024_3384922 crossref_primary_10_1109_TIT_2023_3341148 |
| Cites_doi | 10.1109/TVT.2017.2756623 10.1109/ICCW.2015.7247223 10.1109/TCOMM.2017.2764892 10.1109/TIT.2006.871040 10.23919/WIOPT.2017.7959863 10.1109/TIT.2013.2238655 10.1109/ISWCS.2015.7454328 10.1109/ICC.2017.7996927 10.1109/TIT.2018.2835507 10.1109/TIFS.2014.2375553 10.1017/CBO9781139030687 10.1109/18.568694 10.1109/ICC.2016.7511291 10.1109/ISIT.2016.7541334 10.1109/ITW.2017.8277998 10.1109/CNS.2016.7860560 10.1109/TIT.2014.2306938 10.1109/JSAC.2016.2577198 10.1109/WCNC.2017.7925532 10.1002/j.1538-7305.1949.tb00928.x 10.1109/TIT.2006.871609 10.1109/TCOMM.2017.2751608 10.1109/CIG.2010.5592665 10.1109/ISIT.2017.8006723 10.1109/TWC.2017.2770097 10.1109/TIT.2012.2184668 |
| ContentType | Journal Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019 Distributed under a Creative Commons Attribution 4.0 International License |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019 – notice: Distributed under a Creative Commons Attribution 4.0 International License |
| DBID | 97E ESBDL RIA RIE AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D 1XC VOOES ADTOC UNPAY |
| DOI | 10.1109/TIT.2019.2902578 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE Xplore Open Access Journals IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Hyper Article en Ligne (HAL) Hyper Article en Ligne (HAL) (Open Access) Unpaywall for CDI: Periodical Content Unpaywall |
| DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Technology Research Database |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher – sequence: 2 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science |
| EISSN | 1557-9654 |
| EndPage | 5124 |
| ExternalDocumentID | 10.1109/tit.2019.2902578 oai:HAL:hal-02440815v1 10_1109_TIT_2019_2902578 8657945 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: H2020 European Research Council grantid: 715111 funderid: 10.13039/100010663 |
| GroupedDBID | -~X .DC 0R~ 29I 3EH 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABFSI ABQJQ ABVLG ACGFO ACGFS ACGOD ACIWK AENEX AETEA AETIX AGQYO AGSQL AHBIQ AI. AIBXA AKJIK AKQYR ALLEH ALMA_UNASSIGNED_HOLDINGS ASUFR ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 E.L EBS EJD ESBDL F5P HZ~ H~9 IAAWW IBMZZ ICLAB IDIHD IFIPE IFJZH IPLJI JAVBF LAI M43 MS~ O9- OCL P2P PQQKQ RIA RIE RNS RXW TAE TN5 VH1 VJK AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D RIG 1XC VOOES ADTOC UNPAY |
| ID | FETCH-LOGICAL-c367t-24ae741acd3f83d8f33c7838aed76bc8ea9690bd17f80388038d547ead3a958b3 |
| IEDL.DBID | UNPAY |
| ISSN | 0018-9448 1557-9654 |
| IngestDate | Sun Oct 26 02:37:30 EDT 2025 Sun Oct 19 06:20:28 EDT 2025 Mon Jun 30 06:42:55 EDT 2025 Wed Oct 01 02:55:16 EDT 2025 Thu Apr 24 23:08:25 EDT 2025 Wed Aug 27 05:50:49 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 8 |
| Keywords | wiretap channel secure capacity-memory tradeoff Index Terms-Broadcast channel secrecy caching |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/OAPA.html Distributed under a Creative Commons Attribution 4.0 International License: http://creativecommons.org/licenses/by/4.0 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c367t-24ae741acd3f83d8f33c7838aed76bc8ea9690bd17f80388038d547ead3a958b3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-6737-5427 0000-0003-2230-3857 0000-0002-8359-5921 0009-0006-0984-6768 |
| OpenAccessLink | https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ielx7/18/8760492/08657945.pdf |
| PQID | 2261886416 |
| PQPubID | 36024 |
| PageCount | 31 |
| ParticipantIDs | crossref_citationtrail_10_1109_TIT_2019_2902578 ieee_primary_8657945 proquest_journals_2261886416 hal_primary_oai_HAL_hal_02440815v1 unpaywall_primary_10_1109_tit_2019_2902578 crossref_primary_10_1109_TIT_2019_2902578 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2019-08-01 |
| PublicationDateYYYYMMDD | 2019-08-01 |
| PublicationDate_xml | – month: 08 year: 2019 text: 2019-08-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York |
| PublicationTitle | IEEE transactions on information theory |
| PublicationTitleAbbrev | TIT |
| PublicationYear | 2019 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Institute of Electrical and Electronics Engineers |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) – name: Institute of Electrical and Electronics Engineers |
| References | ref13 ref12 ref15 ref14 ref11 ref10 ref2 ref1 ref17 ref16 ref19 ref18 ref24 ref26 ref25 ref20 ref22 ref21 ref27 ref8 ref7 ref9 mansour (ref23) 2015 ref4 ref3 ref6 ref5 |
| References_xml | – ident: ref12 doi: 10.1109/TVT.2017.2756623 – ident: ref10 doi: 10.1109/ICCW.2015.7247223 – ident: ref24 doi: 10.1109/TCOMM.2017.2764892 – ident: ref21 doi: 10.1109/TIT.2006.871040 – ident: ref14 doi: 10.23919/WIOPT.2017.7959863 – ident: ref17 doi: 10.1109/TIT.2013.2238655 – ident: ref2 doi: 10.1109/ISWCS.2015.7454328 – ident: ref16 doi: 10.1109/ICC.2017.7996927 – ident: ref3 doi: 10.1109/TIT.2018.2835507 – ident: ref6 doi: 10.1109/TIFS.2014.2375553 – ident: ref27 doi: 10.1017/CBO9781139030687 – year: 2015 ident: ref23 publication-title: On the capacity of broadcast channels with degraded message sets and message cognition under different secrecy constraints – ident: ref19 doi: 10.1109/18.568694 – ident: ref11 doi: 10.1109/ICC.2016.7511291 – ident: ref7 doi: 10.1109/ISIT.2016.7541334 – ident: ref8 doi: 10.1109/ITW.2017.8277998 – ident: ref9 doi: 10.1109/CNS.2016.7860560 – ident: ref1 doi: 10.1109/TIT.2014.2306938 – ident: ref4 doi: 10.1109/JSAC.2016.2577198 – ident: ref15 doi: 10.1109/WCNC.2017.7925532 – ident: ref18 doi: 10.1002/j.1538-7305.1949.tb00928.x – ident: ref26 doi: 10.1109/TIT.2006.871609 – ident: ref5 doi: 10.1109/TCOMM.2017.2751608 – ident: ref20 doi: 10.1109/CIG.2010.5592665 – ident: ref25 doi: 10.1109/ISIT.2017.8006723 – ident: ref13 doi: 10.1109/TWC.2017.2770097 – ident: ref22 doi: 10.1109/TIT.2012.2184668 |
| SSID | ssj0014512 |
| Score | 2.3606446 |
| Snippet | This paper derives upper and lower bounds on the secrecy capacity-memory tradeoff of a wiretap erasure broadcast channel (BC) with <inline-formula> <tex-math... This paper derives upper and lower bounds on the secrecy capacity-memory tradeoff of a wiretap erasure broadcast channel (BC) with [Formula Omitted] weak... This paper derives upper and lower bounds on the secrecy capacity-memory tradeoff of a wiretap erasure broadcast channel (BC) with K w weak receivers and K s... |
| SourceID | unpaywall hal proquest crossref ieee |
| SourceType | Open Access Repository Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 5094 |
| SubjectTerms | Broadcast channel Cache memory caching Coding Computer memory Computer Science Electronic surveillance Encoding Information Theory Libraries Lower bounds Receivers secrecy secure capacity-memory tradeoff Tradeoffs Upper bound Upper bounds wiretap channel Wiretapping Zinc |
| SummonAdditionalLinks | – databaseName: IEEE Electronic Library (IEL) dbid: RIE link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3da9RAEB96fVEfrLaK0SqL-KKYu9vb3WTzIpTScorni1foW5j9ouCRK21OOf96Z_PFVUV8C2FCNpkZ5jffAG8casSQuzTEOJi0KFNTcJOizXKjyCviGEMDiy_Z_EJ-ulSXe_B-6IXx3jfFZ34cL5tcvlvbTQyVTXSmSHzUCEa5ztperSFjIBVvJ4NzUmDyOfqU5LSYLD8uYw1XMZ7FnFpcqLZjgkZXsQCy2axyB2Te21TXuP2Bq9WOvTk_gEV_0rbM5Nt4U5ux_fnbEMf__ZRH8LADnuyklZTHsOerQzjolzqwTscP4cHOhMIj-PA1wkq7ZadkVC0h9nQRS3O3jGyc8-sQ2Dqws5smzsjIpUdn8bZmsWehIqv7BC7Oz5an87RbuZBakeV1OpPoCWOgdSJo4XQQwuZaaPQuz4zVHgtyp43jedDNHBmhnZI5iaPAQmkjnsJ-ta78M2AzkU2R_r-a8iAJpqBXaDD4wswCd0EmMOm5UNpuHnlci7EqG79kWpTEtzLyrez4lsDb4YnrdhbHP2hfE2MHsjhEe37yuYz3CJVIAkLqO0_gKHJmoOqYksBxLwdlp9G3JcFUrnVG-DWBd4Ns_HEOUvE753j-91e8gPuRqq0kPIb9-mbjXxK6qc2rRqx_AUF084Q priority: 102 providerName: IEEE |
| Title | Secrecy Capacity-Memory Tradeoff of Erasure Broadcast Channels |
| URI | https://ieeexplore.ieee.org/document/8657945 https://www.proquest.com/docview/2261886416 https://hal.science/hal-02440815 https://ieeexplore.ieee.org/ielx7/18/8760492/08657945.pdf |
| UnpaywallVersion | publishedVersion |
| Volume | 65 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 1557-9654 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0014512 issn: 1557-9654 databaseCode: RIE dateStart: 19630101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3da9RAEB_s9UH7YLVVGq0liC8KyV2yu8nmRThKyym2CN5B9SXMfqF45I42p55_vbP5OK4Kgr4lYRY2zMzOb3Zn5wfwwqBEdLmJnN8H4xp5pIpERaizXAnKihL0WwMXl9lkxt9eiastqi_PcNIUn9nYPzZn-V_s_Ec-TOSQPJcAbTokGC7IjkS8NG4HdjNBMHwAu7PL9-OP7cpLTswb5iwKl3lUZIL3R5SjwvMK-ZquIk79GZsnWNsKSTuffUFkw7RyC3TeXVVLXH_H-Xwr_pzvw6d-5m3Zydd4VatY__ytqeN__doDuN-h0nDcmtFDuGOrA9jvGR_CbgE4gL2t9oWH8PqDx5x6HZ5SxNUE56MLX7e7DikAGrtwLly48Oy62YQMKd9Ho_GmDv2FhopC8iOYnZ9NTydRx8cQaZbldZRytARAUBvmJDPSMaZzySRak2dKS4sF5drKJLmTTZMZJo3gOdkqw0JIxR7DoFpU9gjClGUjJGWIUeI4YRi0AhU6W6jUJcbxAIa9SkrdNSv3nBnzsklaRkU5fTMtvRLLTokBvNyMWLaNOv4i-5y0vBHzHbYn43el_0aQhRNKEt-SAA69mjZSnWICOO6Nouzc_aYkDJtImRG4DeDVxlD-mAcZ3q15PPkX4adwz7-2xYfHMKivV_YZAaJanTS3Fk86B_gFbDsBzA |
| linkProvider | Unpaywall |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9NAEB615VB6oNCCMBSwEBcQTrLZXXt9QaqqVikkvZBKvVmzLyEROVXrFIVfz6xfSgEhbpa1lteeGc03j_0G4J1Fhegzm_iQBxMGRaJzphM0aaYlRUUMQ2pgdpFOLsXnK3m1BR_7szDOubr5zA3CZV3Lt0uzCqmyoUolqY_chgdSCCGb01p9zUBI1nCDMzJhijq6ouQoH87P56GLKx-MQ1UtjFTbcELb30ILZD1b5R7M3F2V17j-gYvFhsc524dZt9em0eT7YFXpgfn5G43j_37MY3jUQs_4uNGVJ7DlygPY78Y6xK2VH8DeBkfhIXz6GoClWccn5FYNYfZkFppz1zF5OeuW3sdLH5_e1JnGmIJ6tAZvqzicWijJ7z6Fy7PT-ckkaYcuJIanWZWMBTpCGWgs94pb5Tk3meIKnc1SbZTDnAJqbVnmVc0kw5WVIiOF5JhLpfkz2CmXpXsO8ZinI6T_L0fMCwIq6CRq9C7XY8-sFxEMOykUpmUkD4MxFkUdmYzyguRWBLkVrdwieN8_cd2wcfxj7VsSbL8s0GhPjqdFuEe4RBAUkncsgsMgmX5VK5QIjjo9KFqbvi0IqDKlUkKwEXzodeOPfZCR39vHi7-_4g3sTuazaTE9v_jyEh6GJ5q-wiPYqW5W7hVhnUq_rlX8Fyfv9tE |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3fa9RAEB7s9UH7YLVVjFYJ4otCcpfsbrJ5EY7ScootgndQfQmzv6h45I42Vz3_emfz47gqCPqWhAlsmG93vtmdzAfwyqBEdLmJnN8H4xp5pIpERaizXAnKihL0WwNn59lkxt9fiIstqS-vcNIUn9nYXzZn-V_t_Ec-TOSQZi4R2nRINFwQjkS8NG4HdjNBNHwAu7Pzj-PP7cpLk5g3ylkULvOoyATvjyhHhdcV8jVdRZz6MzYvsLYVknYufUFko7Ryi3TeXVVLXH_H-Xwr_pzuw5d-5G3Zybd4VatY__ytqeN_fdoDuN-x0nDcwugh3LHVAez3ig9htwAcwN5W-8JDePvJc069Do8p4mqi89GZr9tdhxQAjV04Fy5ceHLVbEKGlO-j0Xhdh_6HhopC8iOYnZ5MjydRp8cQaZbldZRytERAUBvmJDPSMaZzySRak2dKS4sF5drKJLmTTZMZJo3gOWGVYSGkYo9hUC0q-wTClGUjJGeIUeI4cRi0AhU6W6jUJcbxAIa9S0rdNSv3mhnzsklaRkU5fTctvRPLzokBvN68sWwbdfzF9iV5eWPmO2xPxh9K_4woCyeWJG6SAA69mzZWnWMCOOpBUXbT_bokDptImRG5DeDNBih_jIOAd2scT__F-Bnc87dt8eERDOqrlX1OhKhWLzro_wJnBADL |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secrecy+Capacity-Memory+Tradeoff+of+Erasure+Broadcast+Channels&rft.jtitle=IEEE+transactions+on+information+theory&rft.au=Kamel%2C+Sarah&rft.au=Sarkiss%2C+Mireille&rft.au=Wigger%2C+Michele&rft.au=Ghaya+Rekaya-Ben+Othman&rft.date=2019-08-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=0018-9448&rft.eissn=1557-9654&rft.volume=65&rft.issue=8&rft.spage=5094&rft_id=info:doi/10.1109%2FTIT.2019.2902578&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0018-9448&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0018-9448&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0018-9448&client=summon |