{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:31:45Z","timestamp":1729621905421,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/icassp.2014.6853866","type":"proceedings-article","created":{"date-parts":[[2014,7,29]],"date-time":"2014-07-29T15:23:23Z","timestamp":1406647403000},"page":"1592-1595","source":"Crossref","is-referenced-by-count":4,"title":["Precoding for secret key generation in multiple antenna channels with statistical channel state information"],"prefix":"10.1109","author":[{"given":"Sabrina","family":"Engelmann","sequence":"first","affiliation":[]},{"given":"Anne","family":"Wolf","sequence":"additional","affiliation":[]},{"given":"Eduard A.","family":"Jorswieck","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1561\/0100000026","article-title":"Majorization and matrix monotone functions inwireless communications","volume":"3","author":"jorswieck","year":"2007","journal-title":"Foundations and Trends in Communications and Information Theory"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2012.6284227"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2011.6162580"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511977985"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/18.243431"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2013.2253774"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2012.102512.120084"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2006.262101"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1201\/b15496-5"},{"key":"4","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1561\/0100000036","article-title":"Information theoretic security","volume":"5","author":"liang","year":"2009","journal-title":"Foundations and Trends in Communications and Information Theory"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/142374"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2013.6825164"}],"event":{"name":"ICASSP 2014 - 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","start":{"date-parts":[[2014,5,4]]},"location":"Florence, Italy","end":{"date-parts":[[2014,5,9]]}},"container-title":["2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6844297\/6853544\/06853866.pdf?arnumber=6853866","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T13:31:05Z","timestamp":1498138265000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6853866\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icassp.2014.6853866","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}