{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:14:04Z","timestamp":1729638844540,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,9]]},"DOI":"10.1109\/allerton.2010.5707054","type":"proceedings-article","created":{"date-parts":[[2011,2,3]],"date-time":"2011-02-03T21:50:52Z","timestamp":1296769852000},"page":"1228-1235","source":"Crossref","is-referenced-by-count":16,"title":["Providing secrecy when the eavesdropper channel is arbitrarily varying: A case for multiple antennas"],"prefix":"10.1109","author":[{"given":"Xiang","family":"He","sequence":"first","affiliation":[]},{"given":"Aylin","family":"Yener","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/TIT.2009.2025549"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1155\/2009\/142374"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/ALLERTON.2009.5394526"},{"year":"2010","author":"khisti","journal-title":"Interference Alignment for the Multi-antenna Compound Wiretap Channel","key":"ref13"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/ISIT.2009.5205953"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/TIT.2008.928990"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/TWC.2008.060848"},{"year":"2009","author":"molavianjazi","journal-title":"Secure Communication over Arbitrarily Varying Wiretap Channels","key":"ref17"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1007\/3-540-45539-6_24","article-title":"Information-theoretic Key Agreement: From Weak to Strong Secrecy for Free","author":"maurer","year":"2000","journal-title":"Lecture Notes in Computer Science"},{"year":"1968","author":"gallager","article-title":"Information theory and reliable communication","key":"ref19"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/TIT.1978.1055917"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/TIT.1978.1055892"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/TIT.2008.921879"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/TIT.2008.921680"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/TIT.2008.2011448"},{"key":"ref7","article-title":"The Secrecy Capacity Region of the Gaussian MIMO Multi-receiver Wiretap Channel","author":"ekrem","year":"2009","journal-title":"IEEE Transactions on Information Theory"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"ref9","article-title":"Secure Transmission with Multiple Antennas-I: The MISOME Wiretap Channel","author":"khisti","year":"2007","journal-title":"IEEE Transactions on Information Theory"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/18.312163"},{"key":"ref22","article-title":"MIMO Wiretap Channels with Arbitrarily Varying Eavesdropper Channel States","author":"he","year":"2010","journal-title":"IEEE Transactions on Information Theory"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1007\/BF00533053"},{"key":"ref23","first-page":"48","article-title":"Almost Independence and Secrecy Capacity","volume":"32","author":"csiszar","year":"1996","journal-title":"Problems of Information Transmission"}],"event":{"name":"2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","start":{"date-parts":[[2010,9,29]]},"location":"Monticello, IL, USA","end":{"date-parts":[[2010,10,1]]}},"container-title":["2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5701578\/5706874\/05707054.pdf?arnumber=5707054","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T19:22:11Z","timestamp":1497900131000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5707054\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,9]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/allerton.2010.5707054","relation":{},"subject":[],"published":{"date-parts":[[2010,9]]}}}