{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T14:51:46Z","timestamp":1761663106351},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642304927"},{"type":"electronic","value":"9783642304934"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30493-4_20","type":"book-chapter","created":{"date-parts":[[2012,9,28]],"date-time":"2012-09-28T04:39:18Z","timestamp":1348807158000},"page":"192-203","source":"Crossref","is-referenced-by-count":3,"title":["Optimal Power Allocation for OFDM-Based Wire-Tap Channels with Arbitrarily Distributed Inputs"],"prefix":"10.1007","author":[{"given":"Haohao","family":"Qin","sequence":"first","affiliation":[]},{"given":"Yin","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Xiang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1561\/0100000036","volume":"5","author":"Y. Liang","year":"2008","unstructured":"Liang, Y., Poor, H.V., Shamai, S.: Information theoretic security. Found. Trends Commun. Inf. Theory\u00a05, 355\u2013580 (2008)","journal-title":"Found. Trends Commun. Inf. Theory"},{"issue":"8","key":"20_CR2","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"A. Wyner","year":"1975","unstructured":"Wyner, A.: The wire-tap channel. Bell. Syst. Tech. J.\u00a054(8), 1355\u20131387 (1975)","journal-title":"Bell. Syst. Tech. J."},{"issue":"3","key":"20_CR3","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1109\/TIT.1978.1055892","volume":"24","author":"I. Csiszar","year":"1978","unstructured":"Csiszar, I., Korner, J.: Broadcast channels with confidential messages. IEEE Trans. Inf. Theory\u00a024(3), 339\u2013348 (1978)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"4","key":"20_CR4","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1109\/TIT.1978.1055917","volume":"24","author":"S.L.Y. Cheong","year":"1978","unstructured":"Cheong, S.L.Y., Hellman, M.: The Gaussian wire-tap channel. IEEE Trans. Inf. Theory\u00a024(4), 451\u2013456 (1978)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Oggier, F., Hassibi, B.: The secrecy capacity of the MIMO wiretap channel. In: Proc. 45th Annu. Allerton Conf. Communication, Control and Computing, Monticello, IL, pp. 848\u2013855 (September 2007)","DOI":"10.1109\/ISIT.2008.4595041"},{"issue":"6","key":"20_CR6","doi-asserted-by":"publisher","first-page":"2547","DOI":"10.1109\/TIT.2009.2018322","volume":"55","author":"T. Liu","year":"2009","unstructured":"Liu, T., Shammai, S.: A note on the secrecy capacity of the multi-antenna wiretap channel. IEEE Trans. Inf. Theory\u00a055(6), 2547\u20132553 (2009)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Ekrem, E., Ulukus, S.: Gaussian MIMO multi-receiver wiretap channel. In: Global Telecommunications Conference, Honolulu, HI (November 2009)","DOI":"10.1109\/GLOCOM.2009.5425879"},{"key":"20_CR8","unstructured":"Li, Z., Yates, R., Trappe, W.: Securecy capacity of independent parrallel channels. In: Proc. IEEE int. Symp. Information Theory(ISIT), Seattle, WA, pp. 356\u2013360 (July 2006)"},{"issue":"6","key":"20_CR9","doi-asserted-by":"publisher","first-page":"2470","DOI":"10.1109\/TIT.2008.921678","volume":"54","author":"Y. Liang","year":"2008","unstructured":"Liang, Y., Poor, H.V., Shamai, S.: Secure communication over fading channels. IEEE Trans. Inf. Theory\u00a054(6), 2470\u20132492 (2008)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Jorswieck, E., Wolf, A.: Resource allocation for the wire-tap multi-carrier broadcast channel. In: Proc. International Workshop on Multiple Access Communications (MACOM), St. Petersburg, Russia (June 2008)","DOI":"10.1109\/ICTEL.2008.4652697"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Renna, F., Laurenti, N., Poor, H.V.: Physical layer security for OFDM systems. In: European Wireless Conference, Vienna, Austria (April 2011)","DOI":"10.1109\/EW.2010.5483477"},{"issue":"7","key":"20_CR12","doi-asserted-by":"publisher","first-page":"2675","DOI":"10.1109\/TSP.2009.2016871","volume":"57","author":"Z. Luo","year":"2009","unstructured":"Luo, Z., Zhang, S.: Duality Gap Estimation and Polynomial Time Approximation for Optimal Spectrum Management. IEEE Trans. Signal Processing\u00a057(7), 2675\u20132689 (2009)","journal-title":"IEEE Trans. Signal Processing"},{"issue":"1","key":"20_CR13","first-page":"57","volume":"2","author":"Z. Luo","year":"2008","unstructured":"Luo, Z., Zhang, S.: Dynamic spectrum management: Complexity and duality. IEEE J. Sel.Topics Signal Process., Special Issue on Signal Process., Netw. Dyn. Spectrum Access\u00a02(1), 57\u201373 (2008)","journal-title":"IEEE J. Sel.Topics Signal Process., Special Issue on Signal Process., Netw. Dyn. Spectrum Access"},{"key":"20_CR14","doi-asserted-by":"publisher","first-page":"1310","DOI":"10.1109\/TCOMM.2006.877962","volume":"54","author":"W. Yu","year":"2006","unstructured":"Yu, W., Lui, R.: Dual methods for nonconvex spectrum optimization of multicarrier systems. IEEE Trans. Commun.\u00a054, 1310\u20131322 (2006)","journal-title":"IEEE Trans. Commun."},{"issue":"4","key":"20_CR15","doi-asserted-by":"publisher","first-page":"1261","DOI":"10.1109\/TIT.2005.844072","volume":"51","author":"D. Guo","year":"2005","unstructured":"Guo, D., Shamai, S., Verdu, S.: Mutual information and minimum mean-square error in Gaussian channels. IEEE Trans. Inf. Theory\u00a051(4), 1261\u20131283 (2005)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"4","key":"20_CR16","doi-asserted-by":"publisher","first-page":"2371","DOI":"10.1109\/TIT.2011.2111010","volume":"57","author":"D. Guo","year":"2011","unstructured":"Guo, D., Wu, Y., Shamai, S., Verdu, S.: Estimation in Gaussian noise: Properties of the minimum mean-square error. IEEE Trans. Inf. Theory\u00a057(4), 2371\u20132385 (2011)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"20_CR17","volume-title":"Methods of Mathematical Physics","author":"H. Jeffreys","year":"1988","unstructured":"Jeffreys, H., Jeffreys, B.S.: Methods of Mathematical Physics, 3rd edn. Cambridge University Press, Cambridge (1988)","edition":"3"},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Boyd, L., Vandenberghe, S.: Convex Optimization. Cambridge University Press (2004)","DOI":"10.1017\/CBO9780511804441"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Wireless Internet"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30493-4_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,25]],"date-time":"2023-06-25T23:59:30Z","timestamp":1687737570000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30493-4_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642304927","9783642304934"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30493-4_20","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2012]]}}}