{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2017:CMJR4W5LMR6IIBFBJUMVER6STG","short_pith_number":"pith:CMJR4W5L","canonical_record":{"source":{"id":"1712.09159","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2017-12-26T01:59:55Z","cross_cats_sorted":["math.IT"],"title_canon_sha256":"8c15cf151ff506b8fd045e7346f33a7ee77de4360d82a1cc583c3ab6bf1112a1","abstract_canon_sha256":"816552309eb53a109dbf04d3d5866c725a06577b4b7fd322299591294d9a3703"},"schema_version":"1.0"},"canonical_sha256":"13131e5bab647c8404a14d195247d29987c19d7c95018ae87896f81254607d8d","source":{"kind":"arxiv","id":"1712.09159","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1712.09159","created_at":"2026-05-18T00:27:14Z"},{"alias_kind":"arxiv_version","alias_value":"1712.09159v1","created_at":"2026-05-18T00:27:14Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1712.09159","created_at":"2026-05-18T00:27:14Z"},{"alias_kind":"pith_short_12","alias_value":"CMJR4W5LMR6I","created_at":"2026-05-18T12:31:10Z"},{"alias_kind":"pith_short_16","alias_value":"CMJR4W5LMR6IIBFB","created_at":"2026-05-18T12:31:10Z"},{"alias_kind":"pith_short_8","alias_value":"CMJR4W5L","created_at":"2026-05-18T12:31:10Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2017:CMJR4W5LMR6IIBFBJUMVER6STG","target":"record","payload":{"canonical_record":{"source":{"id":"1712.09159","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2017-12-26T01:59:55Z","cross_cats_sorted":["math.IT"],"title_canon_sha256":"8c15cf151ff506b8fd045e7346f33a7ee77de4360d82a1cc583c3ab6bf1112a1","abstract_canon_sha256":"816552309eb53a109dbf04d3d5866c725a06577b4b7fd322299591294d9a3703"},"schema_version":"1.0"},"canonical_sha256":"13131e5bab647c8404a14d195247d29987c19d7c95018ae87896f81254607d8d","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:27:14.292674Z","signature_b64":"3m/+E3BULRmH9LjkNdADfabcC8m8h3myamk2MmwR9MN57Bb/UD1R3PrFQDKPucTIF+gbnw1Fy12/fhH7x5LVCg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"13131e5bab647c8404a14d195247d29987c19d7c95018ae87896f81254607d8d","last_reissued_at":"2026-05-18T00:27:14.292130Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:27:14.292130Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1712.09159","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:27:14Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"+ErWIOlOnSTWB3tS0KWD7o4ttCRKwqPsTi/HlcIE7yxfFdJeHGYRDCi2lHYiWoDv6cZjmn1bDfaQfOoWKQ87Bw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T19:57:58.222891Z"},"content_sha256":"d2bfb0c797345243fd8bac4d5305e597e4ea7ef2129fe17e035d5b021a84fa35","schema_version":"1.0","event_id":"sha256:d2bfb0c797345243fd8bac4d5305e597e4ea7ef2129fe17e035d5b021a84fa35"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2017:CMJR4W5LMR6IIBFBJUMVER6STG","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Cooperative Transmission for Physical Layer Security by Exploring Social Awareness","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["math.IT"],"primary_cat":"cs.IT","authors_text":"Hui-Ming Wang, Ke-Wen Huang, Qian Yang, Tong-Xing Zheng, Yiming Xu","submitted_at":"2017-12-26T01:59:55Z","abstract_excerpt":"Social awareness and social ties are becoming increasingly fashionable with emerging mobile and handheld devices. Social trust degree describing the strength of the social ties has drawn lots of research interests in many fields including secure cooperative communications. Such trust degree reflects the users' willingness for cooperation, which impacts the selection of the cooperative users in the practical networks. In this paper, we propose a cooperative relay and jamming selection scheme to secure communication based on the social trust degree under a stochastic geometry framework. We aim t"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1712.09159","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:27:14Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"lDgRLOHw/xF8Fm5WREDNbH5oFRPYV0mgC8MeNnPlVBfXRmiRJx6aAHFNca57JLqNSUXPQeCDGbEc/UI2kIiEDA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T19:57:58.223571Z"},"content_sha256":"3d7f9f1b0c4f3bf39e8b1b339a817beb8f49263dff6dfc93e660d1a641ce3f97","schema_version":"1.0","event_id":"sha256:3d7f9f1b0c4f3bf39e8b1b339a817beb8f49263dff6dfc93e660d1a641ce3f97"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/CMJR4W5LMR6IIBFBJUMVER6STG/bundle.json","state_url":"https://pith.science/pith/CMJR4W5LMR6IIBFBJUMVER6STG/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/CMJR4W5LMR6IIBFBJUMVER6STG/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-22T19:57:58Z","links":{"resolver":"https://pith.science/pith/CMJR4W5LMR6IIBFBJUMVER6STG","bundle":"https://pith.science/pith/CMJR4W5LMR6IIBFBJUMVER6STG/bundle.json","state":"https://pith.science/pith/CMJR4W5LMR6IIBFBJUMVER6STG/state.json","well_known_bundle":"https://pith.science/.well-known/pith/CMJR4W5LMR6IIBFBJUMVER6STG/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2017:CMJR4W5LMR6IIBFBJUMVER6STG","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"816552309eb53a109dbf04d3d5866c725a06577b4b7fd322299591294d9a3703","cross_cats_sorted":["math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2017-12-26T01:59:55Z","title_canon_sha256":"8c15cf151ff506b8fd045e7346f33a7ee77de4360d82a1cc583c3ab6bf1112a1"},"schema_version":"1.0","source":{"id":"1712.09159","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1712.09159","created_at":"2026-05-18T00:27:14Z"},{"alias_kind":"arxiv_version","alias_value":"1712.09159v1","created_at":"2026-05-18T00:27:14Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1712.09159","created_at":"2026-05-18T00:27:14Z"},{"alias_kind":"pith_short_12","alias_value":"CMJR4W5LMR6I","created_at":"2026-05-18T12:31:10Z"},{"alias_kind":"pith_short_16","alias_value":"CMJR4W5LMR6IIBFB","created_at":"2026-05-18T12:31:10Z"},{"alias_kind":"pith_short_8","alias_value":"CMJR4W5L","created_at":"2026-05-18T12:31:10Z"}],"graph_snapshots":[{"event_id":"sha256:3d7f9f1b0c4f3bf39e8b1b339a817beb8f49263dff6dfc93e660d1a641ce3f97","target":"graph","created_at":"2026-05-18T00:27:14Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Social awareness and social ties are becoming increasingly fashionable with emerging mobile and handheld devices. Social trust degree describing the strength of the social ties has drawn lots of research interests in many fields including secure cooperative communications. Such trust degree reflects the users' willingness for cooperation, which impacts the selection of the cooperative users in the practical networks. In this paper, we propose a cooperative relay and jamming selection scheme to secure communication based on the social trust degree under a stochastic geometry framework. We aim t","authors_text":"Hui-Ming Wang, Ke-Wen Huang, Qian Yang, Tong-Xing Zheng, Yiming Xu","cross_cats":["math.IT"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2017-12-26T01:59:55Z","title":"Cooperative Transmission for Physical Layer Security by Exploring Social Awareness"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1712.09159","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:d2bfb0c797345243fd8bac4d5305e597e4ea7ef2129fe17e035d5b021a84fa35","target":"record","created_at":"2026-05-18T00:27:14Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"816552309eb53a109dbf04d3d5866c725a06577b4b7fd322299591294d9a3703","cross_cats_sorted":["math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2017-12-26T01:59:55Z","title_canon_sha256":"8c15cf151ff506b8fd045e7346f33a7ee77de4360d82a1cc583c3ab6bf1112a1"},"schema_version":"1.0","source":{"id":"1712.09159","kind":"arxiv","version":1}},"canonical_sha256":"13131e5bab647c8404a14d195247d29987c19d7c95018ae87896f81254607d8d","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"13131e5bab647c8404a14d195247d29987c19d7c95018ae87896f81254607d8d","first_computed_at":"2026-05-18T00:27:14.292130Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:27:14.292130Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"3m/+E3BULRmH9LjkNdADfabcC8m8h3myamk2MmwR9MN57Bb/UD1R3PrFQDKPucTIF+gbnw1Fy12/fhH7x5LVCg==","signature_status":"signed_v1","signed_at":"2026-05-18T00:27:14.292674Z","signed_message":"canonical_sha256_bytes"},"source_id":"1712.09159","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:d2bfb0c797345243fd8bac4d5305e597e4ea7ef2129fe17e035d5b021a84fa35","sha256:3d7f9f1b0c4f3bf39e8b1b339a817beb8f49263dff6dfc93e660d1a641ce3f97"],"state_sha256":"bd3e98537f789ba4a28b8de5e9330dd085d926c3d3df7e8fda843e19ec3618b7"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"tru1mj48gx88CacMeZCP+duKm6xBvN7cW0op5//g2Trv7F+lowN+EN0X/P09s5nOxQqAlyIr1CYk+lhH6yiPBw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-22T19:57:58.227171Z","bundle_sha256":"3c760940d98c2432c78f2041d683aada62e0e805005b7132a080e02498921775"}}