{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T07:46:30Z","timestamp":1742975190776,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319288642"},{"type":"electronic","value":"9783319288659"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-28865-9_46","type":"book-chapter","created":{"date-parts":[[2016,1,23]],"date-time":"2016-01-23T03:40:02Z","timestamp":1453520402000},"page":"697-710","source":"Crossref","is-referenced-by-count":0,"title":["Secrecy Rate Based User Selection Algorithms for Massive MIMO Wireless Networks"],"prefix":"10.1007","author":[{"given":"M.","family":"Arif Khan","sequence":"first","affiliation":[]},{"given":"Rafiqul","family":"Islam","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"46_CR1","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/MCOM.2015.7120012","volume":"53","author":"Dzevdan Kapetanovic","year":"2015","unstructured":"Kapetanovic, D., Zheng, G., Rusek, F.: Physical Layer Security for Massive MIMO: An Overview on Passive Eavesdropping and Active Attacks (2015). \n                    http:\/\/arxiv.org\/abs\/org\/pdf\/1504.07154v1.pdf","journal-title":"IEEE Communications Magazine"},{"key":"46_CR2","unstructured":"Dean, T.R., Goldsmith, A.: Physical-Layer Cryptography through Massive MIMO (2013). \n                    http:\/\/arxiv.org\/abs\/org\/abs\/1310.1861"},{"issue":"3","key":"46_CR3","doi-asserted-by":"crossref","first-page":"1550","DOI":"10.1109\/SURV.2014.012314.00178","volume":"16","author":"Amitav Mukherjee","year":"2014","unstructured":"Mukherjee, A., Fakoorian, S.A.A., Huang, J., Swindlehurst, A.L.: Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey (2014). \n                    http:\/\/arxiv.org\/pdf\/1011.3754v3.pdf","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"11","key":"46_CR4","doi-asserted-by":"publisher","first-page":"3590","DOI":"10.1109\/TWC.2010.092810.091092","volume":"9","author":"TL Marzetta","year":"2010","unstructured":"Marzetta, T.L.: Noncooperative Cellular Wireless with Unlimited Number of BS Antennas. IEEE Transaction on Wireless Communications 9(11), 3590\u20133600 (2010)","journal-title":"IEEE Transaction on Wireless Communications"},{"issue":"1","key":"46_CR5","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSP.2011.2178495","volume":"30","author":"F Rusek","year":"2013","unstructured":"Rusek, F., Persson, D., Lau, B.K., Larsson, E.G., Marzetta, T.L., Edfors, O., Tufvesson, F.: Scaling Up MIMO: Opportunities and Challenges with Very Large Arrays. IEEE Signal Processing Magazine 30(1), 40\u201346 (2013)","journal-title":"IEEE Signal Processing Magazine"},{"issue":"2","key":"46_CR6","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1109\/MCOM.2014.6736761","volume":"52","author":"EG Larsson","year":"2014","unstructured":"Larsson, E.G., Edfors, O., Tufvesson, F., Marzetta, T.L.: Massive MIMO for Next Generation Wireless Systems. IEEE Communication Magazine 52(2), 186\u2013195 (2014)","journal-title":"IEEE Communication Magazine"},{"issue":"9","key":"46_CR7","doi-asserted-by":"publisher","first-page":"4766","DOI":"10.1109\/TWC.2014.2337308","volume":"13","author":"J Zhu","year":"2014","unstructured":"Zhu, J., Schober, R., Bhargava, V.K.: Secure Transmission in Multi-Cell Massive MIMO Systems. IEEE Transaction on Wireless Communications 13(9), 4766\u20134781 (2014)","journal-title":"IEEE Transaction on Wireless Communications"},{"key":"46_CR8","doi-asserted-by":"crossref","unstructured":"Biglieri, B., Calderbank, R., Constantinides, A., Goldsmith, A., Paulraj, A., Poor, H.V.: MIMO Wireless Communications. Cambridge University Press (2007)","DOI":"10.1017\/CBO9780511618420"},{"issue":"8","key":"46_CR9","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1109\/LCOMM.2003.815652","volume":"7","author":"Z Tu","year":"2003","unstructured":"Tu, Z., Blum, R.S.: Multiuser Diversity for a Dirty Paper Approach. IEEE Communication Letters 7(8), 370\u2013372 (2003)","journal-title":"IEEE Communication Letters"},{"issue":"3","key":"46_CR10","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1109\/JSAC.2005.862421","volume":"24","author":"T Yoo","year":"2006","unstructured":"Yoo, T., Goldsmith, A.: On the Optimality of Multi-antenna Broadcast Scheduling using Zero-Forcing Beamforming. IEEE Journal on Selected Areas in Communications 24(3), 528\u2013541 (2006)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"10","key":"46_CR11","doi-asserted-by":"publisher","first-page":"3857","DOI":"10.1109\/TSP.2005.855401","volume":"53","author":"G Dimic","year":"2005","unstructured":"Dimic, G., Sidiropoulos, N.D.: On Downlink Beamforming with Greedy User Selection: Performance Analysis and a Simple New Algorithm. IEEE Transactions on Signal Processing 53(10), 3857\u20133868 (2005)","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"8","key":"46_CR12","doi-asserted-by":"publisher","first-page":"4961","DOI":"10.1109\/TIT.2011.2158487","volume":"57","author":"F Oggier","year":"2011","unstructured":"Oggier, F., Hassibi, B.: The Secrecy Capacity of the MIMO Wiretap Channel. IEEE Transactions on Information Theory 57(8), 4961\u20134972 (2011)","journal-title":"IEEE Transactions on Information Theory"},{"key":"46_CR13","unstructured":"Roy, S.: Two-Layer Linear Processing for Massive MIMO on the TitanMIMO Platform. Nutaq white paper on MIMO Platform (2015). \n                    http:\/\/nutaq.com\/en\/library\/whitepaper-news\/new-paper-two-layer-linear-processing-massive-mimo-titanmimo-platform"},{"key":"46_CR14","unstructured":"Paulraj, A., Nabar, R., Gore, D.: Introduction to Space-Time Wireless Communications. Cambridge University Press (2008)"},{"key":"46_CR15","doi-asserted-by":"crossref","unstructured":"Khan, M.A., Vesilo, R., Collings, I.B.: Efficient user selection algorithms for wireless broadcast channels. In: The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (2007)","DOI":"10.1109\/AUSWIRELESS.2007.29"},{"key":"46_CR16","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/j.sbspro.2010.01.030","volume":"2","author":"M Yanase","year":"2010","unstructured":"Yanase, M., Ohtsuki, T.: User Selection Scheme with Secrecy Capacity in MIMO Downlink Systems. Procedia Social and Behavioral Sciences 2, 161\u2013170 (2010)","journal-title":"Procedia Social and Behavioral Sciences"},{"issue":"2","key":"46_CR17","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MCOM.2014.6736746","volume":"52","author":"Federico Boccardi","year":"2014","unstructured":"Boccardi, F., Heath Jr., R.W., Lozano, A., Marzetta, T.L., Popovski, P.: Five Disruptive Technology Directions for 5G. IEEE Communication Magazine, 74\u201380, February 2014","journal-title":"IEEE Communications Magazine"},{"key":"46_CR18","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1109\/ACCESS.2015.2407194","volume":"3","author":"G Wunder","year":"2015","unstructured":"Wunder, G., Boche, H., Strohmer, T., Jung, P.: Sparse Signal Processing Concepts for Efficient 5G System Design. IEEE Access 3, 195\u2013208 (2015)","journal-title":"IEEE Access"},{"key":"46_CR19","doi-asserted-by":"publisher","first-page":"11","DOI":"10.15325\/BLTJ.2015.2407793","volume":"20","author":"TL Marzetta","year":"2015","unstructured":"Marzetta, T.L.: Massive MIMO: An introduction. Bell Labs Technical Journal 20, 11\u201322 (2015)","journal-title":"Bell Labs Technical Journal"},{"issue":"5","key":"46_CR20","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/MSP.2013.2256953","volume":"30","author":"Y-WP Hong","year":"2013","unstructured":"Hong, Y.-W.P., Pang-Chang, L., Kuo, C.-C.J.: Enhancing Physical Layer Secrecy in Multiantenna Wireless Systems: An Overview of Signal Processing Approaches. IEEE Signal Processing Magazine 30(5), 29\u201340 (2013)","journal-title":"IEEE Signal Processing Magazine"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-28865-9_46","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,10,11]],"date-time":"2018-10-11T13:05:09Z","timestamp":1539263109000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-28865-9_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319288642","9783319288659"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-28865-9_46","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2015]]}}}