{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:16:06Z","timestamp":1729660566374,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,11]]},"DOI":"10.1109\/glocom.2009.5425556","type":"proceedings-article","created":{"date-parts":[[2010,3,8]],"date-time":"2010-03-08T11:49:02Z","timestamp":1268048942000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Secure Joint Source-Channel Coding for Quasi-Static Fading Channels"],"prefix":"10.1109","author":[{"given":"Tony Q. S.","family":"Quek","sequence":"first","affiliation":[]},{"given":"Kiran Thimme","family":"Gowda","sequence":"additional","affiliation":[]},{"given":"Hyundong","family":"Shin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"18","article-title":"Source and channel coding for quasi-static fading channels","author":"g\u00fcnd\u00fcz","year":"2005","journal-title":"Proc Asilomar Conf on Signals Systems and Computers"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.904963"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.911274"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/18.720551"},{"key":"ref15","first-page":"831","article-title":"Secure broadcasting with multiuser diversity","author":"khisti","year":"2007","journal-title":"Proc Allerton Conf on Commun Control and Computing"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921908"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.820010"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"2493","DOI":"10.1109\/TIT.2008.921879","article-title":"Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions","volume":"54","author":"rupheng","year":"2008","journal-title":"IEEE Trans Inf Theory"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921678"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.060848"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921861"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"ref9","first-page":"1433","article-title":"Secure diversity-multiplexing gain tradeoff in MIMO relay channels","author":"gowda","year":"2009","journal-title":"Proc IEEE Int Symp on Inform Theory"}],"event":{"name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","start":{"date-parts":[[2009,11,30]]},"location":"Honolulu, Hawaii","end":{"date-parts":[[2009,12,4]]}},"container-title":["GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5425207\/5425208\/05425556.pdf?arnumber=5425556","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T01:54:25Z","timestamp":1497837265000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5425556\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/glocom.2009.5425556","relation":{},"subject":[],"published":{"date-parts":[[2009,11]]}}}