{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:23:24Z","timestamp":1742912604685,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319236087"},{"type":"electronic","value":"9783319236094"}],"license":[{"start":{"date-parts":[[2015,9,25]],"date-time":"2015-09-25T00:00:00Z","timestamp":1443139200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,9,25]],"date-time":"2015-09-25T00:00:00Z","timestamp":1443139200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-23609-4_3","type":"book-chapter","created":{"date-parts":[[2015,9,24]],"date-time":"2015-09-24T15:08:31Z","timestamp":1443107311000},"page":"33-52","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["MIMOME Gaussian Channels with GMM Signals in High-SNR Regime: Fundamental Limits and Tradeoffs"],"prefix":"10.1007","author":[{"given":"Francesco","family":"Renna","sequence":"first","affiliation":[]},{"given":"Nicola","family":"Laurenti","sequence":"additional","affiliation":[]},{"given":"Stefano","family":"Tomasin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,9,25]]},"reference":[{"issue":"11","key":"3_CR1","doi-asserted-by":"crossref","first-page":"1765","DOI":"10.1109\/TIFS.2014.2348915","volume":"9","author":"Marco Baldi","year":"2014","unstructured":"Baldi M, Chiaraluce F, Laurenti N, Tomasin S, Renna F (2014) Secrecy transmission on parallel channels: theoretical limits and performance of practical codes. IEEE Trans Inf Forensics Secur 9(11):1765\u20131779","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"3_CR2","doi-asserted-by":"crossref","DOI":"10.1002\/0471200611","volume-title":"Elements of information theory","author":"TM Cover","year":"1991","unstructured":"Cover TM, Thomas JA (1991) Elements of information theory. Wiley, New York"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Csisz\u00e1r I, K$$\\ddot{\\rm o}$$rner J (1978) Broadcast channels with confidential messages. IEEE Trans Inf Theory 24(3):339\u2013348","DOI":"10.1109\/TIT.1978.1055892"},{"issue":"4","key":"3_CR4","doi-asserted-by":"crossref","first-page":"1678","DOI":"10.1109\/TVT.2013.2285244","volume":"63","author":"Kanapathippillai Cumanan","year":"2014","unstructured":"Cumanan K, Ding Z, Sharif B, Tian GY, Leung KK (2014) Secrecy rate optimizations for a MIMO secrecy channel with a multiple-antenna eavesdropper. IEEE Trans Veh Technol 63(4):1678\u20131690","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"3_CR5","volume-title":"Pattern classification","author":"RO Duda","year":"2000","unstructured":"Duda RO, Hart PE, Stork DG (2000) Pattern classification, 2nd edn. Wiley-Interscience, New York","edition":"2"},{"key":"3_CR6","volume-title":"Matrix computations","author":"GH Golub","year":"1996","unstructured":"Golub GH, Loan CFV (1996) Matrix computations. Johns Hopkins University Press, Baltimore"},{"issue":"11","key":"3_CR7","doi-asserted-by":"crossref","first-page":"6844","DOI":"10.1109\/TIT.2014.2359192","volume":"60","author":"Xiang He","year":"2014","unstructured":"He X, Yener A (2014) MIMO wiretap channels with unknown and varying eavesdropper channel states. IEEE Trans Inf Theory 60(11):6844\u20136869","journal-title":"IEEE Transactions on Information Theory"},{"issue":"1","key":"3_CR8","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1109\/TCOMM.2013.112213.130302","volume":"62","author":"Xiang He","year":"2014","unstructured":"He X, Khisti A, Yener A (2014) MIMO broadcast channel with an unknown eavesdropper: secrecy degrees of freedom. IEEE Trans Commun 62(1):246\u2013255","journal-title":"IEEE Transactions on Communications"},{"key":"3_CR9","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511810817","volume-title":"Matrix analysis","author":"R Horn","year":"1985","unstructured":"Horn R, Johnson C (1985) Matrix analysis. Cambridge University Press, Cambridge"},{"issue":"11","key":"3_CR10","doi-asserted-by":"crossref","first-page":"5515","DOI":"10.1109\/TIT.2010.2068852","volume":"56","author":"Ashish Khisti","year":"2010","unstructured":"Khisti A, Wornell GW (2010) Secure transmission with multiple antennas-part II: the MIMOME wiretap channel. IEEE Trans Inf Theory 56(11):5515\u20135532","journal-title":"IEEE Transactions on Information Theory"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Kiessling M, Speidel J (2004) Exact ergodic capacity of MIMO channels in correlated Rayleigh fading environments. In: Proceedings of IEEE International Zurich Seminar on Communication, Zurich, Switzerland","DOI":"10.1109\/ICC.2004.1312614"},{"issue":"4","key":"3_CR12","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1109\/TIT.1978.1055917","volume":"24","author":"S. Leung-Yan-Cheong","year":"1978","unstructured":"Leung-Yan-Cheong S, Hellman ME (1978) The Gaussian wire-tap channel. IEEE Trans Inf Theory 24(4):451\u2013456","journal-title":"IEEE Transactions on Information Theory"},{"key":"3_CR13","unstructured":"Li Z, Yates R, Trappe W (2006) Secrecy capacity of independent parallel channels. In: Allerton conference in communication, control, and computing, Monticello, IL"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Lin CH, Tsai SH, Lin YP (2014) Secure transmission using MIMO precoding. IEEE Trans Inf Forensics Secur 9(5):801\u2013813","DOI":"10.1109\/TIFS.2014.2309211"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Liu T, Shamai S (2009) A note on the secrecy capacity of the multiple-antenna wiretap channel. IEEE Trans Inf Theory 55(6):2547\u20132553","DOI":"10.1109\/TIT.2009.2018322"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Reboredo H, Renna F, Calderbank R, Rodrigues MRD (2013) Compressive classification. In: Proceedings of IEEE international symposium on information theory (ISIT), Istanbul, Turkey","DOI":"10.1109\/ISIT.2013.6620311"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Reeves G, Goela N, Milosavljevic N, Gastpar M (2011) A compressed sensing wire-tap channel. CoRR abs\/1105.2621","DOI":"10.1109\/ITW.2011.6089562"},{"issue":"4","key":"3_CR18","doi-asserted-by":"crossref","first-page":"1354","DOI":"10.1109\/TIFS.2012.2195491","volume":"7","author":"Francesco Renna","year":"2012","unstructured":"Renna F, Laurenti N, Poor H (2012) Physical-layer secrecy for OFDM transmissions over fading channels. IEEE Trans Inf Forensics Secur 7(4):1354\u20131367","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Tomasin S (2013) Resource allocation for secret transmissions over MIMOME fading channels. In: IEEE global conference on communication (GLOBECOM), Workshop on Trusted Communications with Physical Layer Security, Atlanta","DOI":"10.1109\/GLOCOMW.2013.6825167"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Tomasin S, Laurenti N (2014) Secret message transmission by HARQ with multiple encoding. In: Proceedings of IEEE international conference on communication (ICC), Sydney, Australia","DOI":"10.1109\/ICC.2014.6883648"},{"issue":"3","key":"3_CR21","doi-asserted-by":"crossref","first-page":"551","DOI":"10.1109\/TIFS.2011.2139208","volume":"6","author":"Chan Wong Wong","year":"2011","unstructured":"Wong CW, Wong T, Shea J (2011) Secret-sharing LDPC codes for the BPSK-constrained Gaussian wiretap channel. IEEE Trans Inf Forensics Secur 6(3):551\u2013564","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"Wyner A (1975) The wiretap channel. Bell Syst Tech J 54(8):1355\u20131387","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"}],"container-title":["Lecture Notes in Electrical Engineering","Physical and Data-Link Security Techniques for Future Communication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-23609-4_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,21]],"date-time":"2023-02-21T10:48:25Z","timestamp":1676976505000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-23609-4_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,25]]},"ISBN":["9783319236087","9783319236094"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-23609-4_3","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2015,9,25]]},"assertion":[{"value":"25 September 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}