{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T08:32:56Z","timestamp":1730277176880,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,2]]},"DOI":"10.1109\/ita.2011.5743591","type":"proceedings-article","created":{"date-parts":[[2011,4,8]],"date-time":"2011-04-08T23:42:30Z","timestamp":1302306150000},"page":"1-8","source":"Crossref","is-referenced-by-count":4,"title":["Towards achieving full secrecy rate in wireless networks: A control theoretic approach"],"prefix":"10.1109","author":[{"given":"Zhoujia","family":"Mao","sequence":"first","affiliation":[]},{"given":"Can Emre","family":"Koksal","sequence":"additional","affiliation":[]},{"given":"Ness B.","family":"Shroff","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/EW.2010.5483463"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2010.5513702"},{"journal-title":"Security-capacity Tradeoff in Large Wireless Networks Using Keyless Secrecy","year":"2010","author":"vasudevan","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2010.5757463"},{"journal-title":"Asilomar Conference on Signals Systems and Computers","year":"2010","author":"koksal","key":"ref14"},{"key":"ref15","article-title":"Control of wireless networks with secrecy","volume":"abs 1101","author":"koksal","year":"2011"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/18.108264"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(02)00401-2"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11134-006-0067-2"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.876219"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISITA.2008.4895417"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2006.261613"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921678"},{"key":"ref5","article-title":"Secure transmission with multiple antennas: The MISOME wiretap channel","author":"khisti","year":"2009","journal-title":"IEEE Trans Inform Theory"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2009.5351368"},{"journal-title":"The Secrecy Capacity Region of the Gaussian MIMO Multi-receiver Wiretap Channel","year":"2009","author":"ekrem","key":"ref7"},{"key":"ref2","first-page":"4687","volume":"54","author":"gopala","year":"2008","journal-title":"On the secrecy capacity of fading channels"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ITA.2010.5454119"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2009.5205955"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2010.5560115"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462158"}],"event":{"name":"2011 Information Theory and Applications Workshop (ITA)","start":{"date-parts":[[2011,2,6]]},"location":"La Jolla, CA, USA","end":{"date-parts":[[2011,2,11]]}},"container-title":["2011 Information Theory and Applications Workshop"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5740083\/5743555\/05743591.pdf?arnumber=5743591","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T06:56:40Z","timestamp":1490079400000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5743591\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,2]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/ita.2011.5743591","relation":{},"subject":[],"published":{"date-parts":[[2011,2]]}}}