{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2019:O64LSBE3PTUI2RQVSWQVP3TNRL","short_pith_number":"pith:O64LSBE3","canonical_record":{"source":{"id":"1901.07955","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2019-01-23T15:37:38Z","cross_cats_sorted":["math.IT"],"title_canon_sha256":"3793dd84c3c1af8e93121f126eab90fc46f13d7c47be7dc6dca28becb1db321c","abstract_canon_sha256":"9ce04d8757ccac41b3571b60ff9362e851ef1fb5d15c6032cad08f2970b82fdb"},"schema_version":"1.0"},"canonical_sha256":"77b8b9049b7ce88d461595a157ee6d8af1dc31293f1ee03981eb1c5a3ae12deb","source":{"kind":"arxiv","id":"1901.07955","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1901.07955","created_at":"2026-05-17T23:55:39Z"},{"alias_kind":"arxiv_version","alias_value":"1901.07955v1","created_at":"2026-05-17T23:55:39Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1901.07955","created_at":"2026-05-17T23:55:39Z"},{"alias_kind":"pith_short_12","alias_value":"O64LSBE3PTUI","created_at":"2026-05-18T12:33:24Z"},{"alias_kind":"pith_short_16","alias_value":"O64LSBE3PTUI2RQV","created_at":"2026-05-18T12:33:24Z"},{"alias_kind":"pith_short_8","alias_value":"O64LSBE3","created_at":"2026-05-18T12:33:24Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2019:O64LSBE3PTUI2RQVSWQVP3TNRL","target":"record","payload":{"canonical_record":{"source":{"id":"1901.07955","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2019-01-23T15:37:38Z","cross_cats_sorted":["math.IT"],"title_canon_sha256":"3793dd84c3c1af8e93121f126eab90fc46f13d7c47be7dc6dca28becb1db321c","abstract_canon_sha256":"9ce04d8757ccac41b3571b60ff9362e851ef1fb5d15c6032cad08f2970b82fdb"},"schema_version":"1.0"},"canonical_sha256":"77b8b9049b7ce88d461595a157ee6d8af1dc31293f1ee03981eb1c5a3ae12deb","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:55:39.403981Z","signature_b64":"+xjQiLukKh2DZeqdvubb5mAhcAcCoUXQT/zeEYarvNA5S0H6TGuykt9Q9fMaeVgJeoVddS/cxu0oIqIn29QgDw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"77b8b9049b7ce88d461595a157ee6d8af1dc31293f1ee03981eb1c5a3ae12deb","last_reissued_at":"2026-05-17T23:55:39.403631Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:55:39.403631Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1901.07955","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:55:39Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"kBWaOgw9wX73KMsvo3WXfgX5aTyxG5oQostnCFvB5TLf7Cgv6gNWFk3gfROYh+u6V/vYaS2vtZVpqNjuYF3uCA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T04:23:57.079972Z"},"content_sha256":"8d05b8e9a03473ae20da4a38228bb188b26a82ec822a78a1e333cb5b726e883e","schema_version":"1.0","event_id":"sha256:8d05b8e9a03473ae20da4a38228bb188b26a82ec822a78a1e333cb5b726e883e"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2019:O64LSBE3PTUI2RQVSWQVP3TNRL","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"A Survey of Optimization Approaches for Wireless Physical Layer Security","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["math.IT"],"primary_cat":"cs.IT","authors_text":"Bo Bai, Dong Wang, Wenbo Zhao, Zhu Han","submitted_at":"2019-01-23T15:37:38Z","abstract_excerpt":"Due to the malicious attacks in wireless networks, physical layer security has attracted increasing concerns from both academia and industry. The research on physical layer security mainly focuses either on the secrecy capacity/achievable secrecy rate/capacity-equivocation region from the perspective of information theory, or on the security designs from the viewpoints of optimization and signal processing. Because of its importance in security designs, the latter research direction is surveyed in a comprehensive way in this paper. The survey begins with typical wiretap channel models to cover"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1901.07955","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:55:39Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"RUjEZydH3PmUbooSAe/wUOI8qLnkxthf0YglTT+sbU23ZqAFc49/W7Yc6vIVVJOeCiVDoenXu3GWRkZ23qQKAQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T04:23:57.080662Z"},"content_sha256":"bb4a4dab6bb400188fc532ff4337866222b4cc2c78c2c13e8613a3db9a48dd6b","schema_version":"1.0","event_id":"sha256:bb4a4dab6bb400188fc532ff4337866222b4cc2c78c2c13e8613a3db9a48dd6b"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/O64LSBE3PTUI2RQVSWQVP3TNRL/bundle.json","state_url":"https://pith.science/pith/O64LSBE3PTUI2RQVSWQVP3TNRL/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/O64LSBE3PTUI2RQVSWQVP3TNRL/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-20T04:23:57Z","links":{"resolver":"https://pith.science/pith/O64LSBE3PTUI2RQVSWQVP3TNRL","bundle":"https://pith.science/pith/O64LSBE3PTUI2RQVSWQVP3TNRL/bundle.json","state":"https://pith.science/pith/O64LSBE3PTUI2RQVSWQVP3TNRL/state.json","well_known_bundle":"https://pith.science/.well-known/pith/O64LSBE3PTUI2RQVSWQVP3TNRL/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2019:O64LSBE3PTUI2RQVSWQVP3TNRL","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"9ce04d8757ccac41b3571b60ff9362e851ef1fb5d15c6032cad08f2970b82fdb","cross_cats_sorted":["math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2019-01-23T15:37:38Z","title_canon_sha256":"3793dd84c3c1af8e93121f126eab90fc46f13d7c47be7dc6dca28becb1db321c"},"schema_version":"1.0","source":{"id":"1901.07955","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1901.07955","created_at":"2026-05-17T23:55:39Z"},{"alias_kind":"arxiv_version","alias_value":"1901.07955v1","created_at":"2026-05-17T23:55:39Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1901.07955","created_at":"2026-05-17T23:55:39Z"},{"alias_kind":"pith_short_12","alias_value":"O64LSBE3PTUI","created_at":"2026-05-18T12:33:24Z"},{"alias_kind":"pith_short_16","alias_value":"O64LSBE3PTUI2RQV","created_at":"2026-05-18T12:33:24Z"},{"alias_kind":"pith_short_8","alias_value":"O64LSBE3","created_at":"2026-05-18T12:33:24Z"}],"graph_snapshots":[{"event_id":"sha256:bb4a4dab6bb400188fc532ff4337866222b4cc2c78c2c13e8613a3db9a48dd6b","target":"graph","created_at":"2026-05-17T23:55:39Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Due to the malicious attacks in wireless networks, physical layer security has attracted increasing concerns from both academia and industry. The research on physical layer security mainly focuses either on the secrecy capacity/achievable secrecy rate/capacity-equivocation region from the perspective of information theory, or on the security designs from the viewpoints of optimization and signal processing. Because of its importance in security designs, the latter research direction is surveyed in a comprehensive way in this paper. The survey begins with typical wiretap channel models to cover","authors_text":"Bo Bai, Dong Wang, Wenbo Zhao, Zhu Han","cross_cats":["math.IT"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2019-01-23T15:37:38Z","title":"A Survey of Optimization Approaches for Wireless Physical Layer Security"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1901.07955","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:8d05b8e9a03473ae20da4a38228bb188b26a82ec822a78a1e333cb5b726e883e","target":"record","created_at":"2026-05-17T23:55:39Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"9ce04d8757ccac41b3571b60ff9362e851ef1fb5d15c6032cad08f2970b82fdb","cross_cats_sorted":["math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2019-01-23T15:37:38Z","title_canon_sha256":"3793dd84c3c1af8e93121f126eab90fc46f13d7c47be7dc6dca28becb1db321c"},"schema_version":"1.0","source":{"id":"1901.07955","kind":"arxiv","version":1}},"canonical_sha256":"77b8b9049b7ce88d461595a157ee6d8af1dc31293f1ee03981eb1c5a3ae12deb","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"77b8b9049b7ce88d461595a157ee6d8af1dc31293f1ee03981eb1c5a3ae12deb","first_computed_at":"2026-05-17T23:55:39.403631Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-17T23:55:39.403631Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"+xjQiLukKh2DZeqdvubb5mAhcAcCoUXQT/zeEYarvNA5S0H6TGuykt9Q9fMaeVgJeoVddS/cxu0oIqIn29QgDw==","signature_status":"signed_v1","signed_at":"2026-05-17T23:55:39.403981Z","signed_message":"canonical_sha256_bytes"},"source_id":"1901.07955","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:8d05b8e9a03473ae20da4a38228bb188b26a82ec822a78a1e333cb5b726e883e","sha256:bb4a4dab6bb400188fc532ff4337866222b4cc2c78c2c13e8613a3db9a48dd6b"],"state_sha256":"8c23d4e5e85318d56148af2f51b09028a3fe9e53472c134a3ba07868f81dbacd"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"3HeCX9Z5OkIvhUWWlF+HQnoWRIkN4BtVCs5aGN//q2GwloWJ8YRX6pHBN14YaoPuFKChV6vagWpq9BQhqSOzAQ==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-20T04:23:57.085329Z","bundle_sha256":"7f685ae6e0f95ae182b3fd97e2ea7bacc1a104e739c75acaaec6704715e727cd"}}