{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T19:45:16Z","timestamp":1648842316941},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2016,7,5]],"date-time":"2016-07-05T00:00:00Z","timestamp":1467676800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1007\/s11277-016-3491-6","type":"journal-article","created":{"date-parts":[[2016,7,5]],"date-time":"2016-07-05T07:17:42Z","timestamp":1467703062000},"page":"729-738","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Defeating the Eavesdropper: On the Achievable Secrecy Capacity Using Reconfigurable Antennas"],"prefix":"10.1007","volume":"91","author":[{"given":"Ahmed M.","family":"Alaa","sequence":"first","affiliation":[]},{"given":"Yasmine","family":"Fahmy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,5]]},"reference":[{"issue":"10","key":"3491_CR1","doi-asserted-by":"crossref","first-page":"4687","DOI":"10.1109\/TIT.2008.928990","volume":"54","author":"PK Gopala","year":"2008","unstructured":"Gopala, P. K., Lai, L., & El Gamal, H. (2008). On the secrecy capacity of fading channels. IEEE Transactions on Information Theory, 54(10), 4687\u20134697.","journal-title":"IEEE Transactions on Information Theory"},{"key":"3491_CR2","doi-asserted-by":"crossref","unstructured":"Barros, J., & Rodrigues, M. R. D. (2006). Secrecy capacity of wireless channels. In Proceedings of the IEEE International Symposium on Information Theory, Seattle, WA, pp. 356\u2013660.","DOI":"10.1109\/ISIT.2006.261613"},{"issue":"5","key":"3491_CR3","doi-asserted-by":"crossref","first-page":"2673","DOI":"10.1109\/TIT.2012.2236972","volume":"59","author":"A Khandani","year":"2013","unstructured":"Khandani, A., Bagherikaram, G., & Motahary, A. (2013). The secrecy capacity region of the Gaussian MIMO broadcast channel. IEEE Transactions on Information Theory, 59(5), 2673\u20132682.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"11","key":"3491_CR4","doi-asserted-by":"crossref","first-page":"5515","DOI":"10.1109\/TIT.2010.2068852","volume":"56","author":"A Khisti","year":"2010","unstructured":"Khisti, A., & Wornell, G. W. (2010). Secure transmission with multiple antennas part II: The MIMOME wiretap channel. IEEE Transactions on Information Theory, 56(11), 5515\u20135532.","journal-title":"IEEE Transactions on Information Theory"},{"key":"3491_CR5","doi-asserted-by":"crossref","unstructured":"Hakola, S., Chen, T., Lehtomaki, J., & Koskela, T. (2010). Device-to-device (D2D) communication in cellular network-performance analysis of optimum and practical communication mode selection. In IEEE Wireless Communications and Networking Conference (WCNC).","DOI":"10.1109\/WCNC.2010.5506133"},{"issue":"9","key":"3491_CR6","doi-asserted-by":"crossref","first-page":"1687","DOI":"10.1109\/JSAC.2013.130904","volume":"31","author":"CY Wu","year":"2013","unstructured":"Wu, C. Y., Lan, P. C., Yeh, P. C., Lee, C. H., & Cheng, C. M. (2013). Practical physical layer security schemes for MIMO-OFDM systems using precoding matrix indices. IEEE Journal on Selected Areas in Communications, 31(9), 1687\u20131700.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"3491_CR7","doi-asserted-by":"crossref","first-page":"1227","DOI":"10.1109\/LAWP.2009.2035720","volume":"8","author":"Y Cai","year":"2009","unstructured":"Cai, Y., & Du, Z. (2009). A novel pattern reconfigurable antenna array for diversity systems. IEEE Antennas and Wireless Propagation Letters, 8, 1227\u20131230.","journal-title":"IEEE Antennas and Wireless Propagation Letters"},{"key":"3491_CR8","doi-asserted-by":"crossref","first-page":"494","DOI":"10.1109\/LCOMM.2012.021612.112402","volume":"16","author":"PA Martin","year":"2012","unstructured":"Martin, P. A., Smith, P. J., & Murch, R. (2012). Improving space\u2013time code performance in slow fading channels using reconfigurable antennas. IEEE Communications Letters, 16, 494\u2013497.","journal-title":"IEEE Communications Letters"},{"key":"3491_CR9","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1155\/2012\/545783","volume":"2012","author":"P Mookiah","year":"2012","unstructured":"Mookiah, P., & Dandekar, K. R. (2012). A reconfigurable antenna-based solution for stationary device authentication in wireless networks. International Journal of Antennas and Propagation, 2012, 11. (Article ID 545783).","journal-title":"International Journal of Antennas and Propagation"},{"key":"3491_CR10","unstructured":"Mehmood, R., & Wallace, J. W. (2011). Wireless security enhancement using parasitic reconfigurable aperture antennas. In Proceedings of the 5th European conference on antennas and propagation (EUCAP), Rome, pp. 2761\u20132765."},{"key":"3491_CR11","unstructured":"Daly, M. (2013). Physical layer encryption using fixed and reconfigurable antennas. PhD diss., University of Illinois at Urbana-Champaign."},{"key":"3491_CR12","doi-asserted-by":"crossref","unstructured":"Mookiah, P., & Dandekar, K. R. (2010). Enhancing wireless security through reconfigurable antennas. In IEEE radio and wireless symposium (RWS).","DOI":"10.1109\/RWS.2010.5434129"},{"issue":"2","key":"3491_CR13","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1109\/LMWC.2003.808714","volume":"13","author":"GH Huff","year":"2003","unstructured":"Huff, G. H., Feng, J., Zhang, J. S., & Bernhard, J. T. (2003). A novel radiation pattern and frequency reconfigurable single turn square spiral microstrip antenna. IEEE Microwave and Wireless Components Letters, 13(2), 57\u201359.","journal-title":"IEEE Microwave and Wireless Components Letters"},{"issue":"2","key":"3491_CR14","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1109\/TAP.2005.863412","volume":"54","author":"N Behdad","year":"2006","unstructured":"Behdad, N., & Sarabandi, K. (2006). Dual-band reconfigurable antenna with a very wide tunability range. IEEE Transactions on Antennas and Propagation, 54(2), 409\u2013416.","journal-title":"IEEE Transactions on Antennas and Propagation"},{"issue":"2","key":"3491_CR15","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1109\/TAP.2005.863393","volume":"54","author":"CJ Panagamuwa","year":"2006","unstructured":"Panagamuwa, C. J., Chauraya, A., & Vardaxoglou, J. C. (2006). Frequency and beam reconfigurable antenna using photoconducting switches. IEEE Transactions on Antennas and Propagation, 54(2), 449\u2013454.","journal-title":"IEEE Transactions on Antennas and Propagation"},{"issue":"3","key":"3491_CR16","doi-asserted-by":"crossref","first-page":"869","DOI":"10.1109\/TAP.2008.916908","volume":"56","author":"D Piazza","year":"2008","unstructured":"Piazza, D., Kirsch, N. J., Forenza, A., Heath, R., & Dandekar, K. R. (2008). Design and evaluation of a reconfigurable antenna array for MIMO systems. IEEE Transactions on Antennas and Propagation, 56(3), 869\u2013881.","journal-title":"IEEE Transactions on Antennas and Propagation"},{"key":"3491_CR17","doi-asserted-by":"crossref","unstructured":"Aghdam, S. R., Duman, T. M., & Di Renzo, M. (2015). On secrecy rate analysis of spatial modulation and space shift keying. In 2015 IEEE international Black Sea conference communications and networking (BlackSeaCom), pp. 63\u201367.","DOI":"10.1109\/BlackSeaCom.2015.7185087"},{"key":"3491_CR18","doi-asserted-by":"crossref","unstructured":"Karmakar, S., & Ghosh, A. (2015). Approximate secrecy capacity region of an asymmetric MAC wiretap channel within 1\/2 bits. In 2015 IEEE 14th Canadian workshop on inInformation theory (CWIT), pp. 88\u201392.","DOI":"10.1109\/CWIT.2015.7255159"},{"key":"3491_CR19","doi-asserted-by":"crossref","unstructured":"Gulcu, T. C., & Barg, A. (2015). Achieving secrecy capacity of the wiretap channel and broadcast channel with a confidential component. In IEEE information theory workshop (ITW), pp. 1\u20135.","DOI":"10.1109\/ITW.2015.7133098"},{"key":"3491_CR20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-319-23609-4_1","volume-title":"Physical and data-link security techniques for future communication systems","author":"A Chorti","year":"2016","unstructured":"Chorti, A., Hollanti, C., Belfiore, J. C., & Poor, H. V. (2016). Physical layer security: A paradigm shift in data confidentiality. In M. Baldi & S. Tomasin (Eds.), Physical and data-link security techniques for future communication systems (pp. 1\u201315). Berlin: Springer International Publishing."},{"key":"3491_CR21","doi-asserted-by":"crossref","unstructured":"Kong, N. (2009). Performance comparison among conventional selection combining, optimum selection combining and maximal ratio combining. In Proceedings of IEEE international conference on communications (ICC\u201909), Dresden, Germany, pp. 1\u20136.","DOI":"10.1109\/ICC.2009.5199319"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-016-3491-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-016-3491-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-016-3491-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T17:49:37Z","timestamp":1498326577000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-016-3491-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,5]]},"references-count":21,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,11]]}},"alternative-id":["3491"],"URL":"https:\/\/doi.org\/10.1007\/s11277-016-3491-6","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,7,5]]}}}