{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T15:54:18Z","timestamp":1649087658212},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2011,8,24]],"date-time":"2011-08-24T00:00:00Z","timestamp":1314144000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1007\/s11235-011-9540-2","type":"journal-article","created":{"date-parts":[[2011,8,23]],"date-time":"2011-08-23T21:35:09Z","timestamp":1314135309000},"page":"2177-2185","source":"Crossref","is-referenced-by-count":10,"title":["Framework for MIMO cross-layer secure communication based on STBC"],"prefix":"10.1007","volume":"52","author":[{"given":"Hong","family":"Wen","sequence":"first","affiliation":[]},{"given":"Guang","family":"Gong","sequence":"additional","affiliation":[]},{"given":"Shi-Chao","family":"Lv","sequence":"additional","affiliation":[]},{"given":"Pin-Han","family":"Ho","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,8,24]]},"reference":[{"key":"9540_CR1","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"29","author":"C. E. Shannon","year":"1949","unstructured":"Shannon, C. E. (1949). Communication theory of secrecy systems. The Bell System Technical Journal, 29, 656\u2013715.","journal-title":"The Bell System Technical Journal"},{"issue":"10","key":"9540_CR2","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"A. D. Wyner","year":"1975","unstructured":"Wyner, A. D. (1975). The wire-tap channel. The Bell System Technical Journal, 54(10), 1355\u20131387.","journal-title":"The Bell System Technical Journal"},{"issue":"5","key":"9540_CR3","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1109\/TIT.1978.1055892","volume":"24","author":"I. Csiszar","year":"1978","unstructured":"Csiszar, I., & Korner, J. (1978). Broadcast channels with confidential messages. IEEE Transactions on Information Theory, 24(5), 339\u2013348.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"12","key":"9540_CR4","doi-asserted-by":"crossref","first-page":"3235","DOI":"10.1109\/TIT.2003.820010","volume":"49","author":"A. O. Hero","year":"2003","unstructured":"Hero, A. O. (2003). Secure space-time communication. IEEE Transactions on Information Theory, 49(12), 3235\u20133249.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"7","key":"9540_CR5","first-page":"52","volume":"2","author":"H. Koorapaty","year":"2003","unstructured":"Koorapaty, H., Hassan, A. A., & Chennakeshu, S. (2003). Secure information transmission for mobile radio. IEEE Transactions on Wireless Communications, 2(7), 52\u201355.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"3","key":"9540_CR6","first-page":"1","volume":"6","author":"Y. Zhang","year":"2009","unstructured":"Zhang, Y., & Dai, H. (2009). A\u00a0real orthogonal space-time coded UWB scheme for wireless secure communications. EURASIP Journal on Wireless Communications and Networking, 6(3), 1\u20138.","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"key":"9540_CR7","volume-title":"Blind deconvolution","author":"S. Hayking","year":"1994","unstructured":"Hayking, S. (1994). Blind deconvolution. Englewood Cliffs: Prentice Hall."},{"issue":"5","key":"9540_CR8","doi-asserted-by":"crossref","first-page":"1143","DOI":"10.1109\/TSP.2003.810295","volume":"51","author":"Y. Hua","year":"2003","unstructured":"Hua, Y., An, S., & Xiang, Y. (2003). Blind identification of FIR MIMO channels by decorrelation subchannels. IEEE Transactions on Signal Processing, 51(5), 1143\u20131155.","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"3","key":"9540_CR9","first-page":"24","volume":"2","author":"X. Li","year":"2007","unstructured":"Li, X., & Hwu, J. (2007). Using antenna array redundancy and channel diversity for secure wireless transmissions. Journal of Communications, 2(3), 24\u201332.","journal-title":"Journal of Communications"},{"issue":"5","key":"9540_CR10","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1109\/LCOMM.2008.080077","volume":"12","author":"H. Kim","year":"2008","unstructured":"Kim, H., & Villasenor, J. D. (2008). Secure MIMO communications in a system with equal numbers of transmit and receive antennas. IEEE Communications Letters, 12(5), 386\u2013388.","journal-title":"IEEE Communications Letters"},{"issue":"6","key":"9540_CR11","doi-asserted-by":"crossref","first-page":"2547","DOI":"10.1109\/TIT.2009.2018322","volume":"55","author":"T. Liu","year":"2009","unstructured":"Liu, T., & Shamai Shitz, S. (2009). A note on the secrecy capacity of the multiantenna wiretap channel. IEEE Transactions on Information Theory, 55(6), 2547\u20132553.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"3","key":"9540_CR12","doi-asserted-by":"crossref","first-page":"733","DOI":"10.1109\/18.256484","volume":"39","author":"U. Maurer","year":"1993","unstructured":"Maurer, U. (1993). Secret key agreement by public discussion from common information. IEEE Transactions on Information Theory, 39(3), 733\u2013742.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"6","key":"9540_CR13","doi-asserted-by":"crossref","first-page":"1915","DOI":"10.1109\/18.476316","volume":"41","author":"C. H. Bennett","year":"1990","unstructured":"Bennett, C. H., Brassard, G., Crepeau, C., & Maurer, U. (1990). Generalized privacy amplification. IEEE Transactions on Information Theory, 41(6), 1915\u20131923.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"6","key":"9540_CR14","doi-asserted-by":"crossref","first-page":"2515","DOI":"10.1109\/TIT.2008.921908","volume":"54","author":"M. Nloch","year":"2008","unstructured":"Nloch, M., Barros, J., & Rodrigues, M. R. D. (2008). Wireless information theoretic security. IEEE Transactions on Information Theory, 54(6), 2515\u20132534.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"7","key":"9540_CR15","doi-asserted-by":"crossref","first-page":"1903","DOI":"10.1016\/j.ins.2007.12.002","volume":"178","author":"Y. Nawaz","year":"2008","unstructured":"Nawaz, Y., & Gong, G. (2008). WG: A family of stream ciphers with designed randomness properties. Information Sciences, 178(7), 1903\u20131916.","journal-title":"Information Sciences"},{"key":"9540_CR16","series-title":"LNCS","first-page":"182","volume-title":"Proceeding of ICISC 2002","author":"N. Courtois","year":"2003","unstructured":"Courtois, N. (2003). Higher order correlation attacks, XL algorithm and cryptanalysis of toyocrypt. In LNCS: Vol. 2587. Proceeding of ICISC 2002 (pp.\u00a0182\u2013199). Berlin: Springer."},{"issue":"5","key":"9540_CR17","doi-asserted-by":"crossref","first-page":"744","DOI":"10.1109\/18.771146","volume":"45","author":"V. Tarokh","year":"1999","unstructured":"Tarokh, V., Jafarkhani, H., & Calderbank, A. R. (1999). Space time block codes from orthogonal designs. IEEE Transactions on Information Theory, 45(5), 744\u2013765.","journal-title":"IEEE Transactions on Information Theory"},{"key":"9540_CR18","unstructured":"IEEE P802.11n (2009). Draft standard for information technology telecommunications and information exchange between systems local and metropolitan area networks specific requirements, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications. 802.11 Working Group of the 802 Committee."},{"issue":"8","key":"9540_CR19","doi-asserted-by":"crossref","first-page":"1451","DOI":"10.1109\/49.730453","volume":"16","author":"S. M. Alamouti","year":"1998","unstructured":"Alamouti, S. M. (1998). A\u00a0simple transmitter diversity scheme for wireless communications. IEEE Journal on Selected Areas in Communications, 16(8), 1451\u20131458.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"2","key":"9540_CR20","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1109\/26.752125","volume":"17","author":"V. Tarokh","year":"1999","unstructured":"Tarokh, V., Naguib, A., Seshadri, N., & Calderbank, A. R. (1999). Space-time codes for high data rate wireless communication: performance criteria in the presence of channel estimation errors, mobility, and multiple paths. IEEE Transactions on Communications, 17(2), 199\u2013207.","journal-title":"IEEE Transactions on Communications"}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-011-9540-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11235-011-9540-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-011-9540-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T10:50:12Z","timestamp":1559386212000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11235-011-9540-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8,24]]},"references-count":20,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,4]]}},"alternative-id":["9540"],"URL":"https:\/\/doi.org\/10.1007\/s11235-011-9540-2","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,8,24]]}}}