{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2015:Z7OBTO4AM4VGX7FS3U2VTJU3LC","short_pith_number":"pith:Z7OBTO4A","canonical_record":{"source":{"id":"1505.07929","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2015-05-29T05:54:47Z","cross_cats_sorted":["cs.CR","math.IT"],"title_canon_sha256":"0abc2e75c825f9f24ec38646797018c8f0cd54aed6174bb25a36f24350e06737","abstract_canon_sha256":"2fd0f9b23735e9d11309b311ff44aec944b83ef1e9f098d14e08afe7ff618f75"},"schema_version":"1.0"},"canonical_sha256":"cfdc19bb80672a6bfcb2dd3559a69b5890f0383b5f55077f9da5c16ef9ee2896","source":{"kind":"arxiv","id":"1505.07929","version":3},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1505.07929","created_at":"2026-05-18T00:58:10Z"},{"alias_kind":"arxiv_version","alias_value":"1505.07929v3","created_at":"2026-05-18T00:58:10Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1505.07929","created_at":"2026-05-18T00:58:10Z"},{"alias_kind":"pith_short_12","alias_value":"Z7OBTO4AM4VG","created_at":"2026-05-18T12:29:52Z"},{"alias_kind":"pith_short_16","alias_value":"Z7OBTO4AM4VGX7FS","created_at":"2026-05-18T12:29:52Z"},{"alias_kind":"pith_short_8","alias_value":"Z7OBTO4A","created_at":"2026-05-18T12:29:52Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2015:Z7OBTO4AM4VGX7FS3U2VTJU3LC","target":"record","payload":{"canonical_record":{"source":{"id":"1505.07929","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2015-05-29T05:54:47Z","cross_cats_sorted":["cs.CR","math.IT"],"title_canon_sha256":"0abc2e75c825f9f24ec38646797018c8f0cd54aed6174bb25a36f24350e06737","abstract_canon_sha256":"2fd0f9b23735e9d11309b311ff44aec944b83ef1e9f098d14e08afe7ff618f75"},"schema_version":"1.0"},"canonical_sha256":"cfdc19bb80672a6bfcb2dd3559a69b5890f0383b5f55077f9da5c16ef9ee2896","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:58:10.734675Z","signature_b64":"RNS5ONttqGQR4N+ianyaHkz/efOyVTpLubVNHYGfdKcPF/oT16ekxJNAIz9tJGQvYE4YqUxIZpEM++ZvbzEfCQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"cfdc19bb80672a6bfcb2dd3559a69b5890f0383b5f55077f9da5c16ef9ee2896","last_reissued_at":"2026-05-18T00:58:10.733986Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:58:10.733986Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1505.07929","source_version":3,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:58:10Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"wT94x/gGhoF/JFypEJIoT+b5qYDyHJ6QKWCDNUDh7RZQnSuIBzvJIQnXwuqEa1WhYvuYVKosWH1jT5e+jduzAQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T06:30:22.128963Z"},"content_sha256":"2af25036dc689fb57a78fd5ebbf97edcbd988e96ff967f34b05f7e3c3ae36c1e","schema_version":"1.0","event_id":"sha256:2af25036dc689fb57a78fd5ebbf97edcbd988e96ff967f34b05f7e3c3ae36c1e"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2015:Z7OBTO4AM4VGX7FS3U2VTJU3LC","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Relay Selection for Wireless Communications Against Eavesdropping: A Security-Reliability Tradeoff Perspective","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CR","math.IT"],"primary_cat":"cs.IT","authors_text":"Jia Zhu, Lajos Hanzo, Xuelong Li, Yulong Zou","submitted_at":"2015-05-29T05:54:47Z","abstract_excerpt":"This article examines the secrecy coding aided wireless communications from a source to a destination in the presence of an eavesdropper from a security-reliability tradeoff (SRT) perspective. Explicitly, the security is quantified in terms of the intercept probability experienced at the eavesdropper, while the outage probability encountered at the destination is used to measure the transmission reliability. We characterize the SRT of conventional direct transmission from the source to the destination and show that if the outage probability is increased, the intercept probability decreases, an"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1505.07929","kind":"arxiv","version":3},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:58:10Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"s5mWchx/ezA6wdnVeE2z/bwgViSisxkZjg4gXZENQSxJ4kvbLAr6OR06puOnYBgbiTEBHWpIYt67id3Uxzp8Bg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T06:30:22.129636Z"},"content_sha256":"d232b3b1ce5ec8858f7490adc7d207fc3b02faf8cb7d09a5330c6914f96e9267","schema_version":"1.0","event_id":"sha256:d232b3b1ce5ec8858f7490adc7d207fc3b02faf8cb7d09a5330c6914f96e9267"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/Z7OBTO4AM4VGX7FS3U2VTJU3LC/bundle.json","state_url":"https://pith.science/pith/Z7OBTO4AM4VGX7FS3U2VTJU3LC/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/Z7OBTO4AM4VGX7FS3U2VTJU3LC/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-24T06:30:22Z","links":{"resolver":"https://pith.science/pith/Z7OBTO4AM4VGX7FS3U2VTJU3LC","bundle":"https://pith.science/pith/Z7OBTO4AM4VGX7FS3U2VTJU3LC/bundle.json","state":"https://pith.science/pith/Z7OBTO4AM4VGX7FS3U2VTJU3LC/state.json","well_known_bundle":"https://pith.science/.well-known/pith/Z7OBTO4AM4VGX7FS3U2VTJU3LC/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2015:Z7OBTO4AM4VGX7FS3U2VTJU3LC","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"2fd0f9b23735e9d11309b311ff44aec944b83ef1e9f098d14e08afe7ff618f75","cross_cats_sorted":["cs.CR","math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2015-05-29T05:54:47Z","title_canon_sha256":"0abc2e75c825f9f24ec38646797018c8f0cd54aed6174bb25a36f24350e06737"},"schema_version":"1.0","source":{"id":"1505.07929","kind":"arxiv","version":3}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1505.07929","created_at":"2026-05-18T00:58:10Z"},{"alias_kind":"arxiv_version","alias_value":"1505.07929v3","created_at":"2026-05-18T00:58:10Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1505.07929","created_at":"2026-05-18T00:58:10Z"},{"alias_kind":"pith_short_12","alias_value":"Z7OBTO4AM4VG","created_at":"2026-05-18T12:29:52Z"},{"alias_kind":"pith_short_16","alias_value":"Z7OBTO4AM4VGX7FS","created_at":"2026-05-18T12:29:52Z"},{"alias_kind":"pith_short_8","alias_value":"Z7OBTO4A","created_at":"2026-05-18T12:29:52Z"}],"graph_snapshots":[{"event_id":"sha256:d232b3b1ce5ec8858f7490adc7d207fc3b02faf8cb7d09a5330c6914f96e9267","target":"graph","created_at":"2026-05-18T00:58:10Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"This article examines the secrecy coding aided wireless communications from a source to a destination in the presence of an eavesdropper from a security-reliability tradeoff (SRT) perspective. Explicitly, the security is quantified in terms of the intercept probability experienced at the eavesdropper, while the outage probability encountered at the destination is used to measure the transmission reliability. We characterize the SRT of conventional direct transmission from the source to the destination and show that if the outage probability is increased, the intercept probability decreases, an","authors_text":"Jia Zhu, Lajos Hanzo, Xuelong Li, Yulong Zou","cross_cats":["cs.CR","math.IT"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2015-05-29T05:54:47Z","title":"Relay Selection for Wireless Communications Against Eavesdropping: A Security-Reliability Tradeoff Perspective"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1505.07929","kind":"arxiv","version":3},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:2af25036dc689fb57a78fd5ebbf97edcbd988e96ff967f34b05f7e3c3ae36c1e","target":"record","created_at":"2026-05-18T00:58:10Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"2fd0f9b23735e9d11309b311ff44aec944b83ef1e9f098d14e08afe7ff618f75","cross_cats_sorted":["cs.CR","math.IT"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2015-05-29T05:54:47Z","title_canon_sha256":"0abc2e75c825f9f24ec38646797018c8f0cd54aed6174bb25a36f24350e06737"},"schema_version":"1.0","source":{"id":"1505.07929","kind":"arxiv","version":3}},"canonical_sha256":"cfdc19bb80672a6bfcb2dd3559a69b5890f0383b5f55077f9da5c16ef9ee2896","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"cfdc19bb80672a6bfcb2dd3559a69b5890f0383b5f55077f9da5c16ef9ee2896","first_computed_at":"2026-05-18T00:58:10.733986Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:58:10.733986Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"RNS5ONttqGQR4N+ianyaHkz/efOyVTpLubVNHYGfdKcPF/oT16ekxJNAIz9tJGQvYE4YqUxIZpEM++ZvbzEfCQ==","signature_status":"signed_v1","signed_at":"2026-05-18T00:58:10.734675Z","signed_message":"canonical_sha256_bytes"},"source_id":"1505.07929","source_kind":"arxiv","source_version":3}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:2af25036dc689fb57a78fd5ebbf97edcbd988e96ff967f34b05f7e3c3ae36c1e","sha256:d232b3b1ce5ec8858f7490adc7d207fc3b02faf8cb7d09a5330c6914f96e9267"],"state_sha256":"593c2ec6698c47ee337fd2663f489c01f77c0c7b0ccd610e5bc52376739961c9"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"yTFhvtgwsl9aetyf9UDcVK/OmMaM/Vu5T2hhfyRcUkAKtrCXrmche2nSUqTLkX+0MTetAyQ2UMW9PUD7wiOgAA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-24T06:30:22.132657Z","bundle_sha256":"3b53d2ee1c036ba6404444cc2b53e0484355f37e6d46d75ddeb75eefbe260358"}}