{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:07Z","timestamp":1750220887034,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,15]],"date-time":"2019-11-15T00:00:00Z","timestamp":1573776000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,15]]},"DOI":"10.1145\/3371676.3371689","type":"proceedings-article","created":{"date-parts":[[2020,1,14]],"date-time":"2020-01-14T04:40:36Z","timestamp":1578976836000},"page":"92-96","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Effective Scrambling Scheme for Physical Layer Security"],"prefix":"10.1145","author":[{"given":"Enjian","family":"Bai","sequence":"first","affiliation":[{"name":"School of Information Science and Technology, Donghua University, Shanghai, China"}]},{"given":"Fangyuan","family":"Qin","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Donghua University, Shanghai, China"}]},{"given":"Sijing","family":"Chen","sequence":"additional","affiliation":[{"name":"Wuhan Maritime Communication Research Institute, Wuhan, China"}]}],"member":"320","published-online":{"date-parts":[[2020,1,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Bloch M. and Barros J. 2011. Physical-Layer Security: From Information Theory to Security Engineering. Cambridge University Press.  Bloch M. and Barros J. 2011. Physical-Layer Security: From Information Theory to Security Engineering. Cambridge University Press.","DOI":"10.1017\/CBO9780511977985"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2019.2922825"},{"key":"e_1_3_2_1_3_1","volume-title":"IEEE Transactions on Vehicular Technology.(July, 2019","author":"Huang Y.","year":"2019","unstructured":"Huang , Y. , Wen , M. , Zheng , B. and Chen , X . 2019. Secure Precoding Aided Spatial Modulation via Transmit Antenna Selection . IEEE Transactions on Vehicular Technology.(July, 2019 ), 1--1. DOI= https:\/\/doi.org\/10.1109\/TVT. 2019 .2930071 10.1109\/TVT.2019.2930071 Huang, Y., Wen, M., Zheng, B. and Chen, X. 2019. Secure Precoding Aided Spatial Modulation via Transmit Antenna Selection. IEEE Transactions on Vehicular Technology.(July, 2019), 1--1. DOI= https:\/\/doi.org\/10.1109\/TVT.2019.2930071"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7355565"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2017.2783955"},{"key":"e_1_3_2_1_6_1","article-title":"LDPC codes for the Gaussian wiretap channel","volume":"6","author":"Klinc D.","year":"2011","unstructured":"Klinc , D. and Ha , J. 2011 . LDPC codes for the Gaussian wiretap channel . IEEE Transactions on Information Theory. 6 , 3, (September 2011), 532--540. DOI= https:\/\/doi.org\/10.1109\/TIFS.2011.2134093 10.1109\/TIFS.2011.2134093 Klinc, D. and Ha, J. 2011. LDPC codes for the Gaussian wiretap channel. IEEE Transactions on Information Theory. 6, 3, (September 2011), 532--540. DOI= https:\/\/doi.org\/10.1109\/TIFS.2011.2134093","journal-title":"IEEE Transactions on Information Theory."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Li J. Dang S. Wen M. Jiang X and Peng Y. 2019. Layered orthogonal frequency division multiplexing with index modulation. IEEE Systems Journal(to be published)  Li J. Dang S. Wen M. Jiang X and Peng Y. 2019. Layered orthogonal frequency division multiplexing with index modulation. IEEE Systems Journal(to be published)","DOI":"10.1109\/JSYST.2019.2918068"},{"key":"e_1_3_2_1_8_1","volume-title":"IEEE Inform. Theory Workshop. 33","author":"Baldi M.","year":"2010","unstructured":"Baldi , M. , Bianchi , M. and Chiaraluce , F . 2010. Non-systematic codes for physical layer security . IEEE Inform. Theory Workshop. 33 , (Dublin, Ireland, August 30- September 03, 2010 ), 1--5. DOI= https:\/\/doi.org\/10.1109\/CIG.2010.5592833 10.1109\/CIG.2010.5592833 Baldi, M., Bianchi, M. and Chiaraluce, F. 2010. Non-systematic codes for physical layer security. IEEE Inform. Theory Workshop. 33, (Dublin, Ireland, August 30- September 03, 2010), 1--5. DOI= https:\/\/doi.org\/10.1109\/CIG.2010.5592833"},{"key":"e_1_3_2_1_9_1","volume-title":"Proc. of the 2017 IEEE Region 10 Conference.","author":"Mohammed A.","year":"2017","unstructured":"Mohammed , A. and Azlan , A . 2017. Performance analysis of physical layer security over different T-error correcting codes . Proc. of the 2017 IEEE Region 10 Conference. ( Penang, Malaysia , November 05-08, 2017 ), 875--878. DOI= https:\/\/doi.org\/10.1109\/TENCON.2017.8227981 10.1109\/TENCON.2017.8227981 Mohammed, A. and Azlan, A. 2017. Performance analysis of physical layer security over different T-error correcting codes. Proc. of the 2017 IEEE Region 10 Conference. (Penang, Malaysia, November 05-08, 2017), 875--878. DOI= https:\/\/doi.org\/10.1109\/TENCON.2017.8227981"},{"key":"e_1_3_2_1_10_1","volume-title":"Symposium on Communications and Vehicular Technologies (SCVT). 9","author":"Wonterghem J.V.","year":"2016","unstructured":"Wonterghem , J.V. , Moeneclasy , M. and Labs , N.B . 2016. Performance comparison of short-length error-correcting code . Symposium on Communications and Vehicular Technologies (SCVT). 9 , ( Mons, Belgium , November 22-22, 2016 ), 1--6. DOI= https:\/\/doi.org\/10.1109\/SCVT.2016.7797660 10.1109\/SCVT.2016.7797660 Wonterghem, J.V., Moeneclasy, M. and Labs, N.B. 2016. Performance comparison of short-length error-correcting code. Symposium on Communications and Vehicular Technologies (SCVT). 9, (Mons, Belgium, November 22-22, 2016), 1--6. DOI= https:\/\/doi.org\/10.1109\/SCVT.2016.7797660"},{"key":"e_1_3_2_1_11_1","article-title":"Complementary Coded Scrambling Multiple Access and Its Performance in Downlink MIMO Channels","volume":"17","author":"Liu X.","year":"2018","unstructured":"Liu , X. , Syu , H. and Chen , H. 2018 . Complementary Coded Scrambling Multiple Access and Its Performance in Downlink MIMO Channels . IEEE Transactions Wireless Communication. 17 , 2, (February 2018), 835--847. DOI= https:\/\/doi.org\/10.1109\/TWC.2017.2771780 10.1109\/TWC.2017.2771780 Liu, X., Syu, H. and Chen, H. 2018. Complementary Coded Scrambling Multiple Access and Its Performance in Downlink MIMO Channels. IEEE Transactions Wireless Communication. 17, 2, (February 2018), 835--847. DOI= https:\/\/doi.org\/10.1109\/TWC.2017.2771780","journal-title":"IEEE Transactions Wireless Communication."},{"key":"e_1_3_2_1_12_1","volume-title":"Journal of Applied Mathematics. 2012","author":"Wu L.L.","year":"2012","unstructured":"Wu , L.L. and Liu , X . 2012. The group involutory matrix of the combinations of two idempotent matrices . Journal of Applied Mathematics. 2012 , ( March 2012 ), Article ID504650. DOI= http:\/\/dx.doi.org\/10.1155\/ 2012\/504650 10.1155\/2012 Wu, L.L. and Liu, X. 2012. The group involutory matrix of the combinations of two idempotent matrices. Journal of Applied Mathematics. 2012, (March 2012), Article ID504650. DOI= http:\/\/dx.doi.org\/10.1155\/2012\/504650"},{"key":"e_1_3_2_1_13_1","volume-title":"IEEE International Conference.","author":"Mehak K.","year":"2017","unstructured":"Mehak , K. and Hukum S . 2018. Asymmetric optical image encryption using random Hilbert mask based on fast walsh hadamard transform . IEEE International Conference. ( Gurgaon, India , October 12-14, 2017 ), 374--377. DOI= https:\/\/doi.org\/10.1109\/IC3TSN.2017.8284508 10.1109\/IC3TSN.2017.8284508 Mehak, K. and Hukum S. 2018. Asymmetric optical image encryption using random Hilbert mask based on fast walsh hadamard transform. IEEE International Conference. (Gurgaon, India, October 12-14, 2017), 374--377. DOI= https:\/\/doi.org\/10.1109\/IC3TSN.2017.8284508"},{"key":"e_1_3_2_1_14_1","volume-title":"Anti-burst PEG Algorithm for P-LDPC Codes with Short-to-Medium Length. IEEE Conference.","author":"Deng L.Y.","year":"2018","unstructured":"Deng , L.Y. , Shi , Z. and Li , Y . 2018 . Anti-burst PEG Algorithm for P-LDPC Codes with Short-to-Medium Length. IEEE Conference. ( Chongqing, China , October 8-11, 2018 ). DOI= https:\/\/doi.org\/10.1109\/ICCT.2018.8599984 10.1109\/ICCT.2018.8599984 Deng, L.Y., Shi, Z. and Li, Y. 2018. Anti-burst PEG Algorithm for P-LDPC Codes with Short-to-Medium Length. IEEE Conference. (Chongqing, China, October 8-11, 2018). DOI= https:\/\/doi.org\/10.1109\/ICCT.2018.8599984"}],"event":{"name":"ICCNS 2019: 2019 the 9th International Conference on Communication and Network Security","sponsor":["University of Tokyo","Chongqing University of Posts and Telecommunications"],"location":"Chongqing China","acronym":"ICCNS 2019"},"container-title":["Proceedings of the 2019 9th International Conference on Communication and Network Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3371676.3371689","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3371676.3371689","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:23Z","timestamp":1750203863000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3371676.3371689"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,15]]},"references-count":14,"alternative-id":["10.1145\/3371676.3371689","10.1145\/3371676"],"URL":"https:\/\/doi.org\/10.1145\/3371676.3371689","relation":{},"subject":[],"published":{"date-parts":[[2019,11,15]]},"assertion":[{"value":"2020-01-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}