{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2016:5SCFTDEE4ZOWSSZCMKA4PETZIH","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"4e8225da1bbd4e0e43504559fc5b3bdda61781a9e1903d2ee6d6146c37d5100b","cross_cats_sorted":["math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2016-05-15T01:37:37Z","title_canon_sha256":"e7e8bea3f6d9e42f6c095e565c7e3cbb7949cb13c9dd3aa9be05bf08cb146041"},"schema_version":"1.0","source":{"id":"1605.04487","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1605.04487","created_at":"2026-05-18T01:14:47Z"},{"alias_kind":"arxiv_version","alias_value":"1605.04487v1","created_at":"2026-05-18T01:14:47Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1605.04487","created_at":"2026-05-18T01:14:47Z"},{"alias_kind":"pith_short_12","alias_value":"5SCFTDEE4ZOW","created_at":"2026-05-18T12:30:01Z"},{"alias_kind":"pith_short_16","alias_value":"5SCFTDEE4ZOWSSZC","created_at":"2026-05-18T12:30:01Z"},{"alias_kind":"pith_short_8","alias_value":"5SCFTDEE","created_at":"2026-05-18T12:30:01Z"}],"graph_snapshots":[{"event_id":"sha256:60960be64a406b4703e308310b199734ddec40b15ca099cf568ad85407ec3fb2","target":"graph","created_at":"2026-05-18T01:14:47Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"In this paper, we investigate an opportunistic relay and jammer scheme along with relay selection algorithms based on the secrecy rate criterion in multiple-input multiple-output buffer-aided down link relay networks, which consist of one source, a number of relay nodes, legitimate users and eavesdroppers, with the constraints of physical layer security. The opportunistic relay and jammer scheme is employed to improve the transmission rate and different relay selection policies are performed to achieve better secrecy rate with the consideration of eavesdroppers. Among all the investigated rela","authors_text":"R. C. de Lamare, X. Luo","cross_cats":["math.IT"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2016-05-15T01:37:37Z","title":"Study of Relay Selection for Physical-Layer Security in Buffer-Aided Relay Networks Based on the Secrecy Rate Criterion"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1605.04487","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:154c520b5bcac423b281e6149b06e39cb1c2b3992c31b46eceb60203b54385ea","target":"record","created_at":"2026-05-18T01:14:47Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"4e8225da1bbd4e0e43504559fc5b3bdda61781a9e1903d2ee6d6146c37d5100b","cross_cats_sorted":["math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2016-05-15T01:37:37Z","title_canon_sha256":"e7e8bea3f6d9e42f6c095e565c7e3cbb7949cb13c9dd3aa9be05bf08cb146041"},"schema_version":"1.0","source":{"id":"1605.04487","kind":"arxiv","version":1}},"canonical_sha256":"ec84598c84e65d694b226281c7927941d680ae2ff30e145ff8177a5ef9830d82","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"ec84598c84e65d694b226281c7927941d680ae2ff30e145ff8177a5ef9830d82","first_computed_at":"2026-05-18T01:14:47.079964Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T01:14:47.079964Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"K4Qx3cNTFno3vNHyAnr4LVTHMe72LpSFTeDwJpL6QIq6ckp6lFg6gczZdQ7hYmeRihwc8Kd19mlAUknbQbU+Dg==","signature_status":"signed_v1","signed_at":"2026-05-18T01:14:47.080599Z","signed_message":"canonical_sha256_bytes"},"source_id":"1605.04487","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:154c520b5bcac423b281e6149b06e39cb1c2b3992c31b46eceb60203b54385ea","sha256:60960be64a406b4703e308310b199734ddec40b15ca099cf568ad85407ec3fb2"],"state_sha256":"976c5a99c585bb4907ccab3eb41005c00176523ac32dba3249f4213f349832fd"}