{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2013:VATFCI2DG5TOY5YYIV2CL2NSV3","short_pith_number":"pith:VATFCI2D","schema_version":"1.0","canonical_sha256":"a8265123433766ec7718457425e9b2aed0f68b27cef859ec4b7e4143430a0fdb","source":{"kind":"arxiv","id":"1305.3055","version":3},"attestation_state":"computed","paper":{"title":"Secrecy Transmission on Block Fading Channels: Theoretical Limits and Performance of Practical Codes","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["math.IT"],"primary_cat":"cs.IT","authors_text":"Francesco Renna, Franco Chiaraluce, Marco Baldi, Marco Bianchi, Nicola Laurenti, Stefano Tomasin","submitted_at":"2013-05-14T08:25:13Z","abstract_excerpt":"We consider a system where an agent (Alice) aims at transmitting a message to a second agent (Bob) over a set of parallel channels, while keeping it secret from a third agent (Eve) by using physical layer security techniques. We assume that Alice perfectly knows the set of channels with respect to Bob, but she has only a statistical knowledge of the channels with respect to Eve. We derive bounds on the achievable outage secrecy rates, by considering coding either within each channel or across all parallel channels. Transmit power is adapted to the channel conditions, with a constraint on the a"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1305.3055","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2013-05-14T08:25:13Z","cross_cats_sorted":["math.IT"],"title_canon_sha256":"0aee53617fdc696f2ce9d49452da2af5304242c6c3418de5a21795cd617e7c1f","abstract_canon_sha256":"5771b2f3182733755f7b7a48199dd682184c977c8c7a2015cb31205a6823d1e4"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T02:39:24.165797Z","signature_b64":"zK/q6KVpuQHwTjDVsYntFHOp6/t9VIvjUdUP6Qki+7sncapLdxj9h9m8cFDNtpfTcsG3ul/ZJHRwbcGhMKgiBg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"a8265123433766ec7718457425e9b2aed0f68b27cef859ec4b7e4143430a0fdb","last_reissued_at":"2026-05-18T02:39:24.165340Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T02:39:24.165340Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Secrecy Transmission on Block Fading Channels: Theoretical Limits and Performance of Practical Codes","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["math.IT"],"primary_cat":"cs.IT","authors_text":"Francesco Renna, Franco Chiaraluce, Marco Baldi, Marco Bianchi, Nicola Laurenti, Stefano Tomasin","submitted_at":"2013-05-14T08:25:13Z","abstract_excerpt":"We consider a system where an agent (Alice) aims at transmitting a message to a second agent (Bob) over a set of parallel channels, while keeping it secret from a third agent (Eve) by using physical layer security techniques. We assume that Alice perfectly knows the set of channels with respect to Bob, but she has only a statistical knowledge of the channels with respect to Eve. We derive bounds on the achievable outage secrecy rates, by considering coding either within each channel or across all parallel channels. Transmit power is adapted to the channel conditions, with a constraint on the a"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1305.3055","kind":"arxiv","version":3},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1305.3055","created_at":"2026-05-18T02:39:24.165431+00:00"},{"alias_kind":"arxiv_version","alias_value":"1305.3055v3","created_at":"2026-05-18T02:39:24.165431+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1305.3055","created_at":"2026-05-18T02:39:24.165431+00:00"},{"alias_kind":"pith_short_12","alias_value":"VATFCI2DG5TO","created_at":"2026-05-18T12:28:04.890932+00:00"},{"alias_kind":"pith_short_16","alias_value":"VATFCI2DG5TOY5YY","created_at":"2026-05-18T12:28:04.890932+00:00"},{"alias_kind":"pith_short_8","alias_value":"VATFCI2D","created_at":"2026-05-18T12:28:04.890932+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/VATFCI2DG5TOY5YYIV2CL2NSV3","json":"https://pith.science/pith/VATFCI2DG5TOY5YYIV2CL2NSV3.json","graph_json":"https://pith.science/api/pith-number/VATFCI2DG5TOY5YYIV2CL2NSV3/graph.json","events_json":"https://pith.science/api/pith-number/VATFCI2DG5TOY5YYIV2CL2NSV3/events.json","paper":"https://pith.science/paper/VATFCI2D"},"agent_actions":{"view_html":"https://pith.science/pith/VATFCI2DG5TOY5YYIV2CL2NSV3","download_json":"https://pith.science/pith/VATFCI2DG5TOY5YYIV2CL2NSV3.json","view_paper":"https://pith.science/paper/VATFCI2D","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1305.3055&json=true","fetch_graph":"https://pith.science/api/pith-number/VATFCI2DG5TOY5YYIV2CL2NSV3/graph.json","fetch_events":"https://pith.science/api/pith-number/VATFCI2DG5TOY5YYIV2CL2NSV3/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/VATFCI2DG5TOY5YYIV2CL2NSV3/action/timestamp_anchor","attest_storage":"https://pith.science/pith/VATFCI2DG5TOY5YYIV2CL2NSV3/action/storage_attestation","attest_author":"https://pith.science/pith/VATFCI2DG5TOY5YYIV2CL2NSV3/action/author_attestation","sign_citation":"https://pith.science/pith/VATFCI2DG5TOY5YYIV2CL2NSV3/action/citation_signature","submit_replication":"https://pith.science/pith/VATFCI2DG5TOY5YYIV2CL2NSV3/action/replication_record"}},"created_at":"2026-05-18T02:39:24.165431+00:00","updated_at":"2026-05-18T02:39:24.165431+00:00"}