{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T16:41:18Z","timestamp":1761324078377,"version":"3.37.3"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,12,1]],"date-time":"2016-12-01T00:00:00Z","timestamp":1480550400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1186\/s13638-016-0761-7","type":"journal-article","created":{"date-parts":[[2016,12,9]],"date-time":"2016-12-09T08:00:51Z","timestamp":1481270451000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Pre-coded LDPC coding for physical layer security"],"prefix":"10.1186","volume":"2016","author":[{"given":"Kyunghoon","family":"Kwon","sequence":"first","affiliation":[]},{"given":"Taehyun","family":"Kim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7230-7875","authenticated-orcid":false,"given":"Jun","family":"Heo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,12,9]]},"reference":[{"key":"761_CR1","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"CE Shannon, Communication theory of secrecy systems. Bell Syst. Tech. J. 28:, 656\u2013715 (1949).","journal-title":"Bell Syst. Tech. J"},{"issue":"8","key":"761_CR2","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"AD Wyner","year":"1975","unstructured":"AD Wyner, The wire-tap channel. Bell Syst. Tech. J. 54(8), 1355\u20131387 (1975).","journal-title":"Bell Syst. Tech. J"},{"key":"761_CR3","doi-asserted-by":"publisher","unstructured":"L Ozarow, AD Wyner, Wire-tap channel. II.AT&T Bell Laboratories Tech. J. 63(10), 2135\u20132157 ((1984)).","DOI":"10.1002\/j.1538-7305.1984.tb00072.x"},{"issue":"3","key":"761_CR4","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1109\/TIT.1978.1055892","volume":"24","author":"I Csiszar","year":"1978","unstructured":"I Csiszar, J Korner, Broadcast channel with confidential messages. IEEE Trans. Inf. Theory. 24(3), 339\u2013348 (1978).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"8","key":"761_CR5","doi-asserted-by":"publisher","first-page":"2933","DOI":"10.1109\/TIT.2007.901143","volume":"53","author":"A Thangaraj","year":"2007","unstructured":"A Thangaraj, S Dihidar, AR Calderbank, S McLaughlin, JM Merolla, Applications of LDPC codes to the wiretap channels. IEEE Trans. Inf. Theory. 53(8), 2933\u20132945 (2007).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"4","key":"761_CR6","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1109\/TIT.1978.1055917","volume":"24","author":"SK Leung-Yan-Cheong","year":"1978","unstructured":"SK Leung-Yan-Cheong, ME Hellman, The Gaussian wiretap channel. IEEE Trans. Inf. Theory. 24(4), 451\u2013456 (1978).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"761_CR7","doi-asserted-by":"publisher","first-page":"532","DOI":"10.1109\/TIFS.2011.2134093","volume":"6","author":"D Klinc","year":"2011","unstructured":"D Klinc, J Ha, S McLaughlin, J Barros, BJ Kwak, LDPC codes for the Gaussian wiretap channel. IEEE Trans. Inf. Forensics Secur. 6(3), 532\u2013540 (2011).","journal-title":"IEEE Trans. Inf. Forensics Secur"},{"key":"761_CR8","doi-asserted-by":"crossref","unstructured":"D Klinc, J Ha, S McLaughlin, J Barros, BJ Kwak, in IEEE Global Telecommunications Conference (GLOBECOM 2009). LDPC codes for physical layer security (HonoluluUSA, p. 2009.","DOI":"10.1109\/GLOCOM.2009.5426065"},{"key":"761_CR9","doi-asserted-by":"crossref","unstructured":"CW Wong, TF Wong, JM Shea, in IEEE GLOBECOM Workshops. LDPC code design for the BPSK-constrained Gaussian wiretap channelUSAHouston, p. 2011.","DOI":"10.1109\/GLOCOMW.2011.6162586"},{"issue":"3","key":"761_CR10","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1109\/TIFS.2011.2139208","volume":"6","author":"CW Wong","year":"2011","unstructured":"CW Wong, TF Wong, JM Shea, Secret-sharing LDPC codes for the BPSK-constrained Gaussian wiretap channel. IEEE Trans. Inf. Forensics Secur. 6(3), 551\u2013564 (2011).","journal-title":"IEEE Trans. Inf. Forensics Secur"},{"issue":"11","key":"761_CR11","doi-asserted-by":"publisher","first-page":"1765","DOI":"10.1109\/TIFS.2014.2348915","volume":"9","author":"M Baldi","year":"2014","unstructured":"M Baldi, F Chiaraluce, N Laurenti, S Tomasin, F Renna, Secrecy Transmission on parallel channels: theoretical limits and performance of practical codes. IEEE Trans. Inf. Forensics Secur. 9(11), 1765\u20131779 (2014).","journal-title":"IEEE Trans. Inf. Forensics Secur"},{"issue":"1","key":"761_CR12","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/TIT.1962.1057683","volume":"8","author":"RG Gallager","year":"1962","unstructured":"RG Gallager, Low-density parity-check codes. IRE Trans Inf. Theory. 8(1), 21\u201328 (1962).","journal-title":"IRE Trans Inf. Theory"},{"issue":"2","key":"761_CR13","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1109\/18.910577","volume":"47","author":"T Richardson","year":"2001","unstructured":"T Richardson, R Urbanke, The capacity of low-density parity-check codes under message-passing decoding. IEEE Trans. Inf. Theory. 47(2), 599\u2013618 (2001).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"761_CR14","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/4234.905935","volume":"5","author":"SY Chung","year":"2001","unstructured":"SY Chung, JGD Forney, T Richardson, R Urbanke, On the design of low-density parity-check codes within 0.0045 dB of the Shannon limit. IEEE Commun. Lett. 5(2), 58\u201360 (2001).","journal-title":"IEEE Commun. Lett"},{"issue":"4","key":"761_CR15","doi-asserted-by":"publisher","first-page":"670","DOI":"10.1109\/TCOMM.2004.826370","volume":"52","author":"S ten Brink","year":"2004","unstructured":"S ten Brink, G Kramer, A Ashikhmin, Design of low-density parity-check codes for modulation and detection. IEEE Trans. Commun. 52(4), 670\u2013678 (2004).","journal-title":"IEEE Trans. Commun"},{"key":"761_CR16","doi-asserted-by":"crossref","unstructured":"M Baldi, M Bianchi, F Chiaraluce, in IEEE Information Theory Workshop (ITW 2010). Non-systematic codes for physical layer securityIrelandDublin, p. 2010.","DOI":"10.1109\/CIG.2010.5592833"},{"issue":"3","key":"761_CR17","doi-asserted-by":"publisher","first-page":"883","DOI":"10.1109\/TIFS.2012.2187515","volume":"7","author":"M Baldi","year":"2012","unstructured":"M Baldi, M Bianchi, F Chiaraluce, Coding with scrambling, concatenation, and HARQ for the AWGN wire-tap channel: a security gap analysis. IEEE Trans. Inf. Forensics Secur. 7(3), 883\u2013894 (2012).","journal-title":"IEEE Trans. Inf. Forensics Secur"},{"key":"761_CR18","first-page":"114","volume":"44","author":"RJ McEliece","year":"1978","unstructured":"RJ McEliece, A public-key cryptosystem based on algebraic coding theory. DSN Prog Rep. 44:, 114\u2013116 (1978).","journal-title":"DSN Prog Rep"},{"issue":"1","key":"761_CR19","first-page":"1","volume":"2015","author":"M Baldi","year":"2015","unstructured":"M Baldi, N Maturo, G Ricciutelli, F Chiaraluce, Security gap analysis of some LDPC coded transmission schemes over the flat and fast fading Gaussian wire-tap channels.EURASIP. J. Wirel. Commun. 2015(1), 1\u201312 (2015).","journal-title":"J. Wirel. Commun"},{"key":"761_CR20","doi-asserted-by":"publisher","first-page":"1727","DOI":"10.1109\/26.957394","volume":"49","author":"S ten Brink","year":"2001","unstructured":"S ten Brink, Convergence behavior of iteratively decoded parallel concatenated codes. IEEE Trans. Commun. 49:, 1727\u20131737 (2001).","journal-title":"IEEE Trans. Commun"},{"issue":"6","key":"761_CR21","first-page":"389","volume":"54","author":"S ten Brink","year":"2000","unstructured":"S ten Brink, Designing iterative decoding schemes with the extrinsic information transfer chart. AE\u00dc Int. J. Electron. Commun. 54(6), 389\u2013398 (2000).","journal-title":"AE\u00dc Int. J. Electron. Commun"},{"issue":"10","key":"761_CR22","doi-asserted-by":"publisher","first-page":"806","DOI":"10.1049\/el:19990555","volume":"35","author":"S ten Brink","year":"1999","unstructured":"S ten Brink, Convergence of iterative decoding. Electron. Lett. 35(10), 806\u2013808 (1999).","journal-title":"Electron. Lett"},{"key":"761_CR23","volume-title":"Digital Communications","author":"JG Proakis","year":"2000","unstructured":"JG Proakis, Digital Communications, 4th Ed McGraw-Hill, New York, 2000)."},{"key":"761_CR24","volume-title":"Error Control Coding: Fundamentals and Applications","author":"Lin Shu","year":"2004","unstructured":"Lin Shu, Costello Danial J, Error Control Coding: Fundamentals and Applications, 2nd (Pearson Prentice Hall, Upper Saddle River, 2004)."},{"key":"761_CR25","unstructured":"IEEE standard for local and metropolitan area networks-part 16: air interface for fixed and mobile broadband wireless access systems. IEEE Std P802.16e\/D12 (2005)."},{"issue":"2","key":"761_CR26","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1109\/TIT.1974.1055186","volume":"20","author":"L Bahl","year":"1974","unstructured":"L Bahl, J Cocke, F Jelinek, J Raviv, Optimal decoding of linear codes for minimizing symbol error rate. IEEE Trans. Inf. Theory. 20(2), 284\u2013287 (1974).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"761_CR27","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1109\/18.485714","volume":"42","author":"J Hagenauer","year":"1996","unstructured":"J Hagenauer, E Offer, L Papke, Iterative decoding of binary block and convolutional codes. IEEE Trans. Inf. Theory. 42:, 429\u2013445 (1996).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"761_CR28","volume-title":"EXIT charts and irregular codes. in IEEE Conference on Information Sciences and Systems (CISS\u201902)","author":"M Tuechler","year":"2002","unstructured":"M Tuechler, J Hagenauer, EXIT charts and irregular codes. in IEEE Conference on Information Sciences and Systems (CISS\u201902) (Princeton, USA, 2002)."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0761-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-016-0761-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0761-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T07:00:42Z","timestamp":1568617242000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-016-0761-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["761"],"URL":"https:\/\/doi.org\/10.1186\/s13638-016-0761-7","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2016,12]]},"article-number":"283"}}