{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T20:38:15Z","timestamp":1725655095415},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,3]]},"DOI":"10.1109\/ciss.2009.5054790","type":"proceedings-article","created":{"date-parts":[[2009,6,2]],"date-time":"2009-06-02T21:12:48Z","timestamp":1243977168000},"page":"606-611","source":"Crossref","is-referenced-by-count":9,"title":["Optimal power allocation for achieving perfect secrecy capacity in MIMO wire-tap channels"],"prefix":"10.1109","author":[{"given":"Jia","family":"Liu","sequence":"first","affiliation":[]},{"given":"Y. Thomas","family":"Hou","sequence":"additional","affiliation":[]},{"given":"Hanif D.","family":"Sherali","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"maximum achievable rates in gaussian mimo wire-tap channels with gaussian signaling","year":"2009","author":"liu","key":"13"},{"journal-title":"Matrix Analysis","year":"1990","author":"horn","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2008.4595041"},{"key":"12","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-4388-3","author":"sherali","year":"1999","journal-title":"A Reformulation-Linearization Technique for Solving Discrete and Continuous Nonconvex Problems"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055892"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055917"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2007.4557589"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.820010"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921680"},{"key":"5","first-page":"957","article-title":"the discrete memory-less multiple access channel with confidential messages","author":"liu","year":"2006","journal-title":"Proc IEEE ISIT"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.915978"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2007.4298439"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.060848"}],"event":{"name":"2009 43rd Annual Conference on Information Sciences and Systems (CISS)","start":{"date-parts":[[2009,3,18]]},"location":"Baltimore, MD, USA","end":{"date-parts":[[2009,3,20]]}},"container-title":["2009 43rd Annual Conference on Information Sciences and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4976858\/5054673\/05054790.pdf?arnumber=5054790","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T20:34:52Z","timestamp":1497818092000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5054790\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/ciss.2009.5054790","relation":{},"subject":[],"published":{"date-parts":[[2009,3]]}}}