{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T21:27:05Z","timestamp":1726003625502},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030058876"},{"type":"electronic","value":"9783030058883"}],"license":[{"start":{"date-parts":[[2018,12,19]],"date-time":"2018-12-19T00:00:00Z","timestamp":1545177600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-05888-3_23","type":"book-chapter","created":{"date-parts":[[2018,12,18]],"date-time":"2018-12-18T18:38:33Z","timestamp":1545158313000},"page":"247-257","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Power Allocation for Physical Layer Security Among Similar Channels"],"prefix":"10.1007","author":[{"given":"Xiangxue","family":"Tai","sequence":"first","affiliation":[]},{"given":"Shuai","family":"Han","sequence":"additional","affiliation":[]},{"given":"Xi","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Qingli","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,19]]},"reference":[{"issue":"4\u20135","key":"23_CR1","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1561\/0100000036","volume":"5","author":"Y Liang","year":"2008","unstructured":"Liang, Y., Poor, H.V., Shamai (Shitz), S.: Information theoretic security. Found. Trends Commun. Inf. Theory 5(4\u20135), 355\u2013580 (2008)","journal-title":"Found. Trends Commun. Inf. Theory"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Huang, Y., Zheng, B., Wen, M., et al.: Improving physical layer security via random precoding. In: IEEE GLOBECOM Workshops, pp. 1\u20136 (2017)","DOI":"10.1109\/GLOCOMW.2017.8269220"},{"issue":"11","key":"23_CR3","doi-asserted-by":"publisher","first-page":"3472","DOI":"10.1109\/TCOMM.2012.072612.110686","volume":"60","author":"G Geraci","year":"2012","unstructured":"Geraci, G., Egan, M., Yuan, J.H., et al.: Secrecy sum-rates for multi-user MIMO regularized channel inversion precoding. IEEE Trans. Commun. 60(11), 3472\u20133482 (2012)","journal-title":"IEEE Trans. Commun."},{"issue":"99","key":"23_CR4","first-page":"1","volume":"6","author":"HM Wang","year":"2016","unstructured":"Wang, H.M., Wang, C., Zheng, T.X., Quek, T.Q.S.: Impact of artificial noise on cellular networks: a stochastic geometry approach. IEEE Trans. Wirel. Commun. 6(99), 1\u20135 (2016)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Lu, Y., Xiong, K., Fan, P., Zhong, Z.: Optimal coordinated beamforming with artificial noise for secure transmission in multi-cell multi-user networks. In: 2017 IEEE International Conference on Communications (ICC), France, Paris, pp. 1\u20136 (2017)","DOI":"10.1109\/ICC.2017.7997130"},{"issue":"8","key":"23_CR6","doi-asserted-by":"publisher","first-page":"1795","DOI":"10.1109\/LCOMM.2017.2697951","volume":"21","author":"W Mei","year":"2017","unstructured":"Mei, W., Chen, Z., Fang, J.: Artificial noise aided energy efficiency optimization in MIMOME system with SWIPT. IEEE Commun. Lett. 21(8), 1795\u20131798 (2017)","journal-title":"IEEE Commun. Lett."},{"issue":"17","key":"23_CR7","doi-asserted-by":"publisher","first-page":"4684","DOI":"10.1109\/TSP.2017.2709270","volume":"65","author":"Q Li","year":"2017","unstructured":"Li, Q., Zhang, Y., Lin, J., et al.: Full-duplex bidirectional secure communications under perfect and distributionally ambiguous eavesdroppers CSI. IEEE Trans. Sig. Process. 65(17), 4684\u20134697 (2017)","journal-title":"IEEE Trans. Sig. Process."},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Yaacoub, E., Al-Husseini, M.: Achieving physical layer security with massive MIMO beamforming. In: 2017 11th European Conference on Antennas and Propagation (EUCAP), Paris, France, pp. 1753\u20131757 (2017)","DOI":"10.23919\/EuCAP.2017.7928045"},{"issue":"9","key":"23_CR9","doi-asserted-by":"publisher","first-page":"7809","DOI":"10.1109\/TVT.2017.2681693","volume":"66","author":"J Ying","year":"2017","unstructured":"Ying, J., Wang, H.-M., Zheng, T.-X., et al.: Secure transmissions in millimeter wave systems. IEEE Trans. Veh. Technol. 66(9), 7809\u20137817 (2017)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"23_CR10","volume-title":"Handbook of Mathematical Functions with Formulaes, Graphs, and Mathematical Tables","author":"M Abramowitz","year":"1974","unstructured":"Abramowitz, M., Stegun, L.A.: Handbook of Mathematical Functions with Formulaes, Graphs, and Mathematical Tables. Dover Publications Inc., New York (1974)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Ad Hoc Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05888-3_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,12,18]],"date-time":"2018-12-18T18:48:05Z","timestamp":1545158885000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05888-3_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,19]]},"ISBN":["9783030058876","9783030058883"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05888-3_23","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018,12,19]]},"assertion":[{"value":"ADHOCNETS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Ad Hoc Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cairns, QLD","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"adhocnets2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/adhocnets.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}