{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:02:21Z","timestamp":1729674141234,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/isit.2013.6620443","type":"proceedings-article","created":{"date-parts":[[2013,10,12]],"date-time":"2013-10-12T02:57:32Z","timestamp":1381546652000},"page":"1332-1336","source":"Crossref","is-referenced-by-count":2,"title":["A statistical physics approach to the wiretap channel"],"prefix":"10.1109","author":[{"given":"Inaki","family":"Esnaola","sequence":"first","affiliation":[]},{"given":"Antonia M.","family":"Tulino","sequence":"additional","affiliation":[]},{"given":"H. Vincent","family":"Poor","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","first-page":"429","article-title":"Asymptotically commuting finite rank unitary operators without commuting approximants","volume":"45","author":"voiculescu","year":"1983","journal-title":"Acta Sci Math"},{"key":"15","article-title":"The secrecy capacity of the MIMO wiretap channel","author":"oggier","year":"2007","journal-title":"Proc Annual Allerton Conference on Communication Control and Computing"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.850094"},{"key":"13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1561\/0100000001","article-title":"Random matrix theory and wireless communications","volume":"1","author":"tulino","year":"2004","journal-title":"Foundations and Trends in Communications and Information Theory"},{"key":"14","article-title":"The MIMOME channel","author":"khisti","year":"2007","journal-title":"Proc Annual Allerton Conference on Communication Control and Computing"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2011.6089562"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2011.6089519"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1088\/0305-4608\/5\/5\/017"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"10","article-title":"The secrecy of compressed sensing measurements","author":"rachlin","year":"2009","journal-title":"Proc Annual Allerton Conference in Communication Control and Computing"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2177575"},{"key":"6","article-title":"A single-letter characterization of optimal noisy compressed sensing","author":"guo","year":"2008","journal-title":"Proc Annual Allerton Conference in Communication Control and Computing"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.847700"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.804053"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1250790.1250804"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2011.6033978"}],"event":{"name":"2013 IEEE International Symposium on Information Theory (ISIT)","start":{"date-parts":[[2013,7,7]]},"location":"Istanbul, Turkey","end":{"date-parts":[[2013,7,12]]}},"container-title":["2013 IEEE International Symposium on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6597029\/6620166\/06620443.pdf?arnumber=6620443","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T23:45:20Z","timestamp":1498088720000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6620443\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/isit.2013.6620443","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}