{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T20:46:41Z","timestamp":1748983601181},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1109\/milcom.2011.6127474","type":"proceedings-article","created":{"date-parts":[[2012,3,1]],"date-time":"2012-03-01T11:34:31Z","timestamp":1330601671000},"page":"125-130","source":"Crossref","is-referenced-by-count":2,"title":["Optimal cooperative jamming for security"],"prefix":"10.1109","author":[{"family":"Han-Ting Chiang","sequence":"first","affiliation":[]},{"given":"James S.","family":"Lehnert","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2009.2031732"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441"},{"journal-title":"CVX MATLAB Software for Disciplined Convex Programming","year":"0","author":"grant","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2010.5502741"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/142374"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC.2010.5671002"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2009.2027462"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2009.5469718"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2009.5394527"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2007.914894"},{"key":"3","article-title":"Cooperative secrecy in wireless communications","author":"ekrem","year":"2010","journal-title":"Securing Wireless Coommunications at the Physical Layer"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1137\/050644471"},{"journal-title":"Information Theoretic Security Source","year":"2009","author":"liang","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2010.2094610"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2005.1558439"},{"key":"6","article-title":"Optimal cooperative relaying schemes for improving wireless physical layer security","author":"li","year":"2010","journal-title":"IEEE Trans Inf Theory"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2009.2038412"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2010.5506452"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2010.2092774"},{"key":"8","article-title":"Secrecy capacity of single- and multi-antenna channels with simple helpers","author":"jorswieck","year":"0","journal-title":"2010 Int ITG Conf Source and Channel Coding (SCC) Siegen Germany Jan 2010"}],"event":{"name":"MILCOM 2011 - 2011 IEEE Military Communications Conference","start":{"date-parts":[[2011,11,7]]},"location":"Baltimore, MD, USA","end":{"date-parts":[[2011,11,10]]}},"container-title":["2011 - MILCOM 2011 Military Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6111660\/6127424\/06127474.pdf?arnumber=6127474","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T10:41:30Z","timestamp":1490092890000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6127474\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/milcom.2011.6127474","relation":{},"subject":[],"published":{"date-parts":[[2011,11]]}}}