{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2017:UAMUGWX7RJTIL3ZEFCPC7I7URD","short_pith_number":"pith:UAMUGWX7","canonical_record":{"source":{"id":"1701.03383","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2017-01-12T15:48:05Z","cross_cats_sorted":["math.IT"],"title_canon_sha256":"1b52aef677ce944b734eb423ce4aec2024fca7cb6ba72dea02634875f174be7a","abstract_canon_sha256":"eb48d9ba4fc2bf76c6d6549bdbd03fb023acdbdadc693bd8114fa3d59339f426"},"schema_version":"1.0"},"canonical_sha256":"a019435aff8a6685ef24289e2fa3f488c5551dad921e8a540f536f3c60d250ab","source":{"kind":"arxiv","id":"1701.03383","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1701.03383","created_at":"2026-05-18T00:52:55Z"},{"alias_kind":"arxiv_version","alias_value":"1701.03383v1","created_at":"2026-05-18T00:52:55Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1701.03383","created_at":"2026-05-18T00:52:55Z"},{"alias_kind":"pith_short_12","alias_value":"UAMUGWX7RJTI","created_at":"2026-05-18T12:31:46Z"},{"alias_kind":"pith_short_16","alias_value":"UAMUGWX7RJTIL3ZE","created_at":"2026-05-18T12:31:46Z"},{"alias_kind":"pith_short_8","alias_value":"UAMUGWX7","created_at":"2026-05-18T12:31:46Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2017:UAMUGWX7RJTIL3ZEFCPC7I7URD","target":"record","payload":{"canonical_record":{"source":{"id":"1701.03383","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2017-01-12T15:48:05Z","cross_cats_sorted":["math.IT"],"title_canon_sha256":"1b52aef677ce944b734eb423ce4aec2024fca7cb6ba72dea02634875f174be7a","abstract_canon_sha256":"eb48d9ba4fc2bf76c6d6549bdbd03fb023acdbdadc693bd8114fa3d59339f426"},"schema_version":"1.0"},"canonical_sha256":"a019435aff8a6685ef24289e2fa3f488c5551dad921e8a540f536f3c60d250ab","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:52:55.993092Z","signature_b64":"qhxRztcMKzSDbZnKV92aPP+UqxZDjc5FS2Oa+YYzxGEDkDC1mBtH5Cqods9yRo2QayIMfqcf5y5XSdh/ULrZCQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"a019435aff8a6685ef24289e2fa3f488c5551dad921e8a540f536f3c60d250ab","last_reissued_at":"2026-05-18T00:52:55.992500Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:52:55.992500Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1701.03383","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:52:55Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"yft7uScbTAFgbmdIp4I2yhcJqMWL1F0aWNaLk5QpqY6XzGfA2wSaNt2MQtwMWXESu2FPVaSev2wBjwreEzx2AA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T10:47:34.804986Z"},"content_sha256":"39a5099fcd08e4d7c506614305db04222b7c16920cddcd32ddd686fcbb53f0a6","schema_version":"1.0","event_id":"sha256:39a5099fcd08e4d7c506614305db04222b7c16920cddcd32ddd686fcbb53f0a6"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2017:UAMUGWX7RJTIL3ZEFCPC7I7URD","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Secure communications with cooperative jamming: Optimal power allocation and secrecy outage analysis","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["math.IT"],"primary_cat":"cs.IT","authors_text":"George C. Alexandropoulos, George K. Karagiannidis, Kanapathippillai Cumanan, Zhgiuo Ding","submitted_at":"2017-01-12T15:48:05Z","abstract_excerpt":"This paper studies the secrecy rate maximization problem of a secure wireless communication system, in the presence of multiple eavesdroppers. The security of the communication link is enhanced through cooperative jamming, with the help of multiple jammers. First, a feasibility condition is derived to achieve a positive secrecy rate at the destination. Then, we solve the original secrecy rate maximization problem, which is not convex in terms of power allocation at the jammers. To circumvent this non-convexity, the achievable secrecy rate is approximated for a given power allocation at the jam"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1701.03383","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:52:55Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"CDoRCwL3W/BbQ7ruk+dDYnrXLZ9DTiI6DcNPBqOYPG9AurcvU0acl3OgMJoY2Aloky4708Gs5rdnZ8eN3a/yCA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T10:47:34.805546Z"},"content_sha256":"c9b0f22ebdd59e49ebad627c5524ada825467e1f16dfa6b1e9b5414caa674170","schema_version":"1.0","event_id":"sha256:c9b0f22ebdd59e49ebad627c5524ada825467e1f16dfa6b1e9b5414caa674170"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/UAMUGWX7RJTIL3ZEFCPC7I7URD/bundle.json","state_url":"https://pith.science/pith/UAMUGWX7RJTIL3ZEFCPC7I7URD/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/UAMUGWX7RJTIL3ZEFCPC7I7URD/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-20T10:47:34Z","links":{"resolver":"https://pith.science/pith/UAMUGWX7RJTIL3ZEFCPC7I7URD","bundle":"https://pith.science/pith/UAMUGWX7RJTIL3ZEFCPC7I7URD/bundle.json","state":"https://pith.science/pith/UAMUGWX7RJTIL3ZEFCPC7I7URD/state.json","well_known_bundle":"https://pith.science/.well-known/pith/UAMUGWX7RJTIL3ZEFCPC7I7URD/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2017:UAMUGWX7RJTIL3ZEFCPC7I7URD","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"eb48d9ba4fc2bf76c6d6549bdbd03fb023acdbdadc693bd8114fa3d59339f426","cross_cats_sorted":["math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2017-01-12T15:48:05Z","title_canon_sha256":"1b52aef677ce944b734eb423ce4aec2024fca7cb6ba72dea02634875f174be7a"},"schema_version":"1.0","source":{"id":"1701.03383","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1701.03383","created_at":"2026-05-18T00:52:55Z"},{"alias_kind":"arxiv_version","alias_value":"1701.03383v1","created_at":"2026-05-18T00:52:55Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1701.03383","created_at":"2026-05-18T00:52:55Z"},{"alias_kind":"pith_short_12","alias_value":"UAMUGWX7RJTI","created_at":"2026-05-18T12:31:46Z"},{"alias_kind":"pith_short_16","alias_value":"UAMUGWX7RJTIL3ZE","created_at":"2026-05-18T12:31:46Z"},{"alias_kind":"pith_short_8","alias_value":"UAMUGWX7","created_at":"2026-05-18T12:31:46Z"}],"graph_snapshots":[{"event_id":"sha256:c9b0f22ebdd59e49ebad627c5524ada825467e1f16dfa6b1e9b5414caa674170","target":"graph","created_at":"2026-05-18T00:52:55Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"This paper studies the secrecy rate maximization problem of a secure wireless communication system, in the presence of multiple eavesdroppers. The security of the communication link is enhanced through cooperative jamming, with the help of multiple jammers. First, a feasibility condition is derived to achieve a positive secrecy rate at the destination. Then, we solve the original secrecy rate maximization problem, which is not convex in terms of power allocation at the jammers. To circumvent this non-convexity, the achievable secrecy rate is approximated for a given power allocation at the jam","authors_text":"George C. Alexandropoulos, George K. Karagiannidis, Kanapathippillai Cumanan, Zhgiuo Ding","cross_cats":["math.IT"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2017-01-12T15:48:05Z","title":"Secure communications with cooperative jamming: Optimal power allocation and secrecy outage analysis"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1701.03383","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:39a5099fcd08e4d7c506614305db04222b7c16920cddcd32ddd686fcbb53f0a6","target":"record","created_at":"2026-05-18T00:52:55Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"eb48d9ba4fc2bf76c6d6549bdbd03fb023acdbdadc693bd8114fa3d59339f426","cross_cats_sorted":["math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2017-01-12T15:48:05Z","title_canon_sha256":"1b52aef677ce944b734eb423ce4aec2024fca7cb6ba72dea02634875f174be7a"},"schema_version":"1.0","source":{"id":"1701.03383","kind":"arxiv","version":1}},"canonical_sha256":"a019435aff8a6685ef24289e2fa3f488c5551dad921e8a540f536f3c60d250ab","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"a019435aff8a6685ef24289e2fa3f488c5551dad921e8a540f536f3c60d250ab","first_computed_at":"2026-05-18T00:52:55.992500Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:52:55.992500Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"qhxRztcMKzSDbZnKV92aPP+UqxZDjc5FS2Oa+YYzxGEDkDC1mBtH5Cqods9yRo2QayIMfqcf5y5XSdh/ULrZCQ==","signature_status":"signed_v1","signed_at":"2026-05-18T00:52:55.993092Z","signed_message":"canonical_sha256_bytes"},"source_id":"1701.03383","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:39a5099fcd08e4d7c506614305db04222b7c16920cddcd32ddd686fcbb53f0a6","sha256:c9b0f22ebdd59e49ebad627c5524ada825467e1f16dfa6b1e9b5414caa674170"],"state_sha256":"ab0bfba6e74097e16e1d17b941e780a8f749a3152054c6c60b84d9782f4330ea"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"sCxcwgmRVMlul4okecNyw6DQqZJIAAWPkntZ1jDv0JLQma5pPniVPO3q2fiQwZ0oi4yMa/n4IhY7Osz1ebhtAQ==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-20T10:47:34.808183Z","bundle_sha256":"bfb57ceb538b01282f6622febe146db317147ea53280ea5e4e5fcc9980748bae"}}