{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:16:02Z","timestamp":1742912162089,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319218366"},{"type":"electronic","value":"9783319218373"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-21837-3_63","type":"book-chapter","created":{"date-parts":[[2015,7,31]],"date-time":"2015-07-31T13:40:31Z","timestamp":1438350031000},"page":"644-653","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Joint Secure Beamforming and User Selection for Multi-user MISO Systems with Confidential Messages"],"prefix":"10.1007","author":[{"given":"Dongyang","family":"Xu","sequence":"first","affiliation":[]},{"given":"Pinyi","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Qinghe","family":"Du","sequence":"additional","affiliation":[]},{"given":"Li","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,1]]},"reference":[{"issue":"8","key":"63_CR1","doi-asserted-by":"publisher","first-page":"1334","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"AD Wyner","year":"1975","unstructured":"Wyner, A.D.: The wire-tap channel. Bell. Syst. Tech. J. 54(8), 1334\u20131387 (1975)","journal-title":"Bell. Syst. Tech. J."},{"issue":"3","key":"63_CR2","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1109\/TIT.1978.1055892","volume":"24","author":"I Csiszar","year":"1978","unstructured":"Csiszar, I., Korner, J.: Broadcast channels with confidential messages. IEEE Trans. Inf. Theory 24(3), 339\u2013348 (1978)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"6","key":"63_CR3","doi-asserted-by":"publisher","first-page":"2515","DOI":"10.1109\/TIT.2008.921908","volume":"54","author":"M Bloch","year":"2008","unstructured":"Bloch, M., Barros, J., Rodrigues, M., McLaughlin, M.: Wireless information-theoretic security. IEEE Trans. Inf. Theory 54(6), 2515\u20132534 (2008)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"63_CR4","doi-asserted-by":"publisher","unstructured":"Xu, Q., Su, Z., Han, B., Fang, D., Xu, Z., Gan, X.: Analytical model with a novel selfishness division of mobile nodes to participate cooperation. Peer-to-Peer Netw. Appl. (2015). doi:10.1007\/s12083-015-0330-6","DOI":"10.1007\/s12083-015-0330-6"},{"key":"63_CR5","doi-asserted-by":"crossref","unstructured":"Su, Z., Xu, Q., Zhu, H., Wang, Y.: A novel design for content delivery over software defined mobile social networks. IEEE Network 29(4) (2015)","DOI":"10.1109\/MNET.2015.7166192"},{"issue":"6","key":"63_CR6","doi-asserted-by":"publisher","first-page":"2470","DOI":"10.1109\/TIT.2008.921678","volume":"54","author":"Y Liang","year":"2008","unstructured":"Liang, Y., Poor, H.V., Shamai, S.: Secure communication over fading channels. IEEE Trans. Inf. Theory 54(6), 2470\u20132492 (2008)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"4","key":"63_CR7","doi-asserted-by":"publisher","first-page":"2083","DOI":"10.1109\/TIT.2011.2111750","volume":"57","author":"E Ekrem","year":"2011","unstructured":"Ekrem, E., Ulukus, S.: The secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel. IEEE Trans. Inf. Theory 57(4), 2083\u20132114 (2011)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"9","key":"63_CR8","doi-asserted-by":"publisher","first-page":"4215","DOI":"10.1109\/TIT.2010.2054593","volume":"56","author":"R Liu","year":"2010","unstructured":"Liu, R., Liu, T., Poor, H.V., Shamai, S.: Multiple-input multiple-output Gaussian broadcast channels with confidential messages. IEEE Trans. Inf. Theory 56(9), 4215\u20134227 (2010)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"11","key":"63_CR9","doi-asserted-by":"publisher","first-page":"3472","DOI":"10.1109\/TCOMM.2012.072612.110686","volume":"60","author":"G Geraci","year":"2012","unstructured":"Geraci, G., Egan, M., Yuan, J., Razi, A., Collings, I.B.: Secrecy sum-rates for multi-user MIMO regularized channel inversion precoding. IEEE Trans. Commun. 60(11), 3472\u20133482 (2012)","journal-title":"IEEE Trans. Commun."},{"issue":"6","key":"63_CR10","doi-asserted-by":"publisher","first-page":"1277","DOI":"10.1109\/TIT.2002.1003822","volume":"48","author":"P Viswanath","year":"2002","unstructured":"Viswanath, P., Tse, D.N.C., Laroia, R.: Opportunistic beamforming using dumb antennas. IEEE Trans. Inf. Theory 48(6), 1277\u20131294 (2002)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"63_CR11","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1109\/TCOMM.2004.841997","volume":"53","author":"BM Hochwald","year":"2005","unstructured":"Hochwald, B.M., Peel, C.B., Swindlehurst, A.L.: A vector-perturbation technique for near-capacity multiantenna multiuser communication - Part II: Perturbation. IEEE Trans. Commun. 53(3), 537\u2013544 (2005)","journal-title":"IEEE Trans. Commun."},{"issue":"3","key":"63_CR12","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1109\/JSAC.2005.862421","volume":"24","author":"T Yoo","year":"2006","unstructured":"Yoo, T., Goldsmith, A.: On the optimality of multiantenna broadcast scheduling using zero-forcing beamforming. IEEE J. Sel. Areas Commun. 24(3), 528\u2013541 (2006)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"3","key":"63_CR13","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1137\/0718026","volume":"18","author":"C Paige","year":"1981","unstructured":"Paige, C., Saunders, M.A.: Towards a generalized singular value decomposition. SIAM J. Numer. Anal. 18(3), 398\u2013405 (1981)","journal-title":"SIAM J. Numer. Anal."}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-21837-3_63","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T13:34:07Z","timestamp":1676468047000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-21837-3_63"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319218366","9783319218373"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-21837-3_63","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"1 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}