{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T00:49:41Z","timestamp":1725756581264},"reference-count":9,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T00:00:00Z","timestamp":1698624000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T00:00:00Z","timestamp":1698624000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000005","name":"U.S. Department of Defense","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000005","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,30]]},"DOI":"10.1109\/milcom58377.2023.10356312","type":"proceedings-article","created":{"date-parts":[[2023,12,25]],"date-time":"2023-12-25T14:37:01Z","timestamp":1703515021000},"page":"833-838","source":"Crossref","is-referenced-by-count":1,"title":["Second-Order Analysis of Secret-Key Capacity From a MIMO Channel"],"prefix":"10.1109","author":[{"given":"Ahmed","family":"Maksud","sequence":"first","affiliation":[{"name":"University of California,Department of Electrical and Computer Engineering,Riverside Riverside,CA,USA"}]},{"given":"Yingbo","family":"Hua","sequence":"additional","affiliation":[{"name":"University of California,Department of Electrical and Computer Engineering,Riverside Riverside,CA,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511977985"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2023.3259142"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2974621"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796694"},{"journal-title":"Random matrix theory and wireless communications. Foundations and trends in communications and information theory","year":"2004","author":"Tulino","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2019.2949501"},{"journal-title":"IEEE Transactions on Communications","article-title":"Secret-message transmission by echoing encrypted probes \u2013 STEEP","author":"Hua","key":"ref9"}],"event":{"name":"MILCOM 2023 - 2023 IEEE Military Communications Conference (MILCOM)","start":{"date-parts":[[2023,10,30]]},"location":"Boston, MA, USA","end":{"date-parts":[[2023,11,3]]}},"container-title":["MILCOM 2023 - 2023 IEEE Military Communications Conference (MILCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10356123\/10356124\/10356312.pdf?arnumber=10356312","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T16:25:50Z","timestamp":1705076750000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10356312\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,30]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/milcom58377.2023.10356312","relation":{},"subject":[],"published":{"date-parts":[[2023,10,30]]}}}