{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:14:05Z","timestamp":1729613645465,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,5]]},"DOI":"10.1109\/icassp.2011.5947125","type":"proceedings-article","created":{"date-parts":[[2011,7,13]],"date-time":"2011-07-13T15:50:30Z","timestamp":1310572230000},"page":"3440-3443","source":"Crossref","is-referenced-by-count":6,"title":["Filter design with secrecy constraints: The multiple-input multiple-output Gaussian wiretap channel with zero forcing receive filters"],"prefix":"10.1109","author":[{"given":"Hugo","family":"Reboredo","sequence":"first","affiliation":[]},{"given":"Vinay","family":"Prabhu","sequence":"additional","affiliation":[]},{"given":"Miguel R. D.","family":"Rodrigues","sequence":"additional","affiliation":[]},{"given":"Joao","family":"Xavier","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1561\/0100000036","article-title":"Information theoretic security","volume":"5","author":"liang","year":"2009","journal-title":"Found Trends Commun Inf Theory"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055892"},{"key":"ref10","article-title":"Filter design with secrecy constraints: The degraded multiple-input multiple-output gaussian wiretap channel","author":"reboredo","year":"2010","journal-title":"VTC2011-spring"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.234"},{"key":"ref5","article-title":"A unified framework for communications through MIMO channels","author":"palomar","year":"2003","journal-title":"Ph D Dissertation"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.666"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"journal-title":"Numerical Analysis","year":"2004","author":"burden","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"}],"event":{"name":"ICASSP 2011 - 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","start":{"date-parts":[[2011,5,22]]},"location":"Prague, Czech Republic","end":{"date-parts":[[2011,5,27]]}},"container-title":["2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5916934\/5946226\/05947125.pdf?arnumber=5947125","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T03:11:02Z","timestamp":1497928262000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5947125\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,5]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/icassp.2011.5947125","relation":{},"subject":[],"published":{"date-parts":[[2011,5]]}}}