{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T16:24:17Z","timestamp":1743006257763,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031638503"},{"type":"electronic","value":"9783031638510"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-63851-0_14","type":"book-chapter","created":{"date-parts":[[2024,6,27]],"date-time":"2024-06-27T23:01:51Z","timestamp":1719529311000},"page":"204-216","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Quantized Digital Amplification Physical Layer Security Schemes"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8864-7743","authenticated-orcid":false,"given":"Pedro","family":"Viegas","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5230-555X","authenticated-orcid":false,"given":"Paulo","family":"Montezuma","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8520-7267","authenticated-orcid":false,"given":"Rui","family":"Dinis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3396-4634","authenticated-orcid":false,"given":"Jo\u00e3o","family":"Guerreiro","sequence":"additional","affiliation":[]},{"given":"Jo\u00e3o Pedro","family":"Oliveira","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,28]]},"reference":[{"issue":"5","key":"14_CR1","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1109\/5.4440","volume":"76","author":"JL Massey","year":"1988","unstructured":"Massey, J.L.: An introduction to contemporary cryptology. Proc. IEEE 76(5), 533\u2013549 (1988)","journal-title":"Proc. IEEE"},{"issue":"9","key":"14_CR2","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/2.708447","volume":"31","author":"B Schneier","year":"1998","unstructured":"Schneier, B.: Cryptographic design vulnerabilities. IEEE Comput. 31(9), 26\u201333 (1998)","journal-title":"IEEE Comput."},{"issue":"11","key":"14_CR3","doi-asserted-by":"publisher","first-page":"3056","DOI":"10.1109\/JPROC.2012.2188769","volume":"100","author":"A Barenghi","year":"2012","unstructured":"Barenghi, A., Breveglieri, L., Koren, I., Naccache, D.: Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures. Proc. IEEE 100(11), 3056\u20133076 (2012)","journal-title":"Proc. IEEE"},{"issue":"5","key":"14_CR4","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MSP.2013.2265141","volume":"30","author":"WK Harrison","year":"2013","unstructured":"Harrison, W.K., Almeida, J., Bloch, M.R., McLaughlin, S.W., Barros, J.: Coding for secrecy: an overview of error-control coding techniques for physical-layer security. IEEE Signal Process. Mag. 30(5), 41\u201350 (2013)","journal-title":"IEEE Signal Process. Mag."},{"key":"14_CR5","doi-asserted-by":"publisher","first-page":"2022007","DOI":"10.1051\/sands\/2022007","volume":"1","author":"W Shi","year":"2022","unstructured":"Shi, W., Jiang, X., Hu, J., et al.: Physical layer security techniques for data transmission for future wireless networks. Secur. Safety 1, 2022007 (2022)","journal-title":"Secur. Safety"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Hamamreh, J.M., Furqan, H.M., Arslan, H.: Classifications and applications of physical layer security techniques for confidentiality: a comprehensive survey. IEEE Commun. Surv. Tutorials, 21(2), 1773\u20131828 (2019)","DOI":"10.1109\/COMST.2018.2878035"},{"key":"14_CR7","unstructured":"Montezuma, P., et al.: Apparatus for quantized linear amplification with nonlinear amplifiers. USPTO Patent application number US10069467B1"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Montezuma, P., Dinis, R.: Implementing physical layer security using transmitters with constellation shaping. Proc. IEEE ICCCN2015, Las Vegas, NV, US, (2015)","DOI":"10.1109\/ICCCN.2015.7288418"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Viegas, P., et al.: A highly-efficient amplification scheme for OFDM signal. IEEE VTC\u201921 (Spring)), Helsinki, Finland (2021)","DOI":"10.1109\/VTC2021-Spring51267.2021.9449004"},{"key":"14_CR10","doi-asserted-by":"publisher","DOI":"10.1201\/b18370","volume-title":"Analytical evaluation of nonlinear distortion effects on multicarrier signals","author":"T Ara\u00fajo","year":"2015","unstructured":"Ara\u00fajo, T., Dinis, R.: Analytical evaluation of nonlinear distortion effects on multicarrier signals. CRC Press (2015). https:\/\/doi.org\/10.1201\/b18370"},{"key":"14_CR11","unstructured":"ETSI, LTE; Evolved Universal Terrestrial Radio Access (E- UTRA); Base Station (BS) radio transmission and reception, ETSI TS 136 104 V8.3.0 (2008\u201311)"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Leinonen, M.E., Jokinen, M., Tervo, N., Kursu O., Pa\u00a8rssinen, A.: System EVM characterization and coverage area estimation of 5G directive mmW Links. IEEE Trans. Microwave Theory Tech. 67(12), 5282\u20135295 (2019)","DOI":"10.1109\/TMTT.2019.2951773"}],"container-title":["IFIP Advances in Information and Communication Technology","Technological Innovation for Human-Centric Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-63851-0_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,27]],"date-time":"2024-06-27T23:03:54Z","timestamp":1719529434000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-63851-0_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031638503","9783031638510"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-63851-0_14","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"28 June 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DoCEIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Doctoral Conference on Computing, Electrical and Industrial Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Caparica","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"doceis2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/doceis.dee.fct.unl.pt\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}