{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:15:30Z","timestamp":1729635330534,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/iccw.2015.7247613","type":"proceedings-article","created":{"date-parts":[[2015,9,14]],"date-time":"2015-09-14T21:18:06Z","timestamp":1442265486000},"page":"2862-2867","source":"Crossref","is-referenced-by-count":3,"title":["Power-efficient joint resource allocation for multiuser wiretap OFDM channels"],"prefix":"10.1109","author":[{"given":"Xiang","family":"Chen","sequence":"first","affiliation":[]},{"given":"Haohao","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Limin","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICTEL.2008.4652697"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2159206"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2013.050713.120730"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6654853"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.060848"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2010.2094610"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2011.2146775"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/79.841722"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055917"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2048445"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2007.4298439"},{"key":"ref8","first-page":"841","article-title":"Secrecy capacity of independent parallel channels","author":"li","year":"2006","journal-title":"Proc 44th Annu Allerton Conf"},{"key":"ref7","first-page":"2562","article-title":"Joint transmit beamforming and artificial noise design for QoS discrimination in wireless downlink","author":"liao","year":"2010","journal-title":"IEEE Int Conf Acoustics Speech and Signal Proc"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1561\/0100000036","article-title":"Information theoretic security","volume":"5","author":"liang","year":"2008","journal-title":"Found Trends Commun Inf Theory"},{"journal-title":"Wireless Security-Models Threats and Solutions","year":"2004","author":"nichols","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921678"}],"event":{"name":"2015 ICC - 2015 IEEE International Conference on Communications Workshops (ICC)","start":{"date-parts":[[2015,6,8]]},"location":"London, United Kingdom","end":{"date-parts":[[2015,6,12]]}},"container-title":["2015 IEEE International Conference on Communication Workshop (ICCW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7226899\/7247062\/07247613.pdf?arnumber=7247613","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T19:31:14Z","timestamp":1498246274000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7247613\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/iccw.2015.7247613","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}