{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T11:57:02Z","timestamp":1730289422289,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/pimrc.2017.8292592","type":"proceedings-article","created":{"date-parts":[[2018,2,15]],"date-time":"2018-02-15T16:31:53Z","timestamp":1518712313000},"page":"1-5","source":"Crossref","is-referenced-by-count":12,"title":["On the achievable secrecy rate of the MIMO VLC Gaussian wiretap channel"],"prefix":"10.1109","author":[{"given":"Mohamed Amine","family":"Arfaoui","sequence":"first","affiliation":[]},{"given":"Ali","family":"Ghrayeb","sequence":"additional","affiliation":[]},{"given":"Chadi","family":"Assi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"334","article-title":"Logarithmic Concave Measures and Functions","volume":"34","author":"pr\u00e9kopa","year":"1973","journal-title":"Acta Mathematica Scientia"},{"key":"ref11","article-title":"A Lower Bound on the Differential Entropy of Log-Concave Random Vectors With Applications","author":"marsiglietti","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2618857"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11081-015-9294-x"},{"journal-title":"CVX MATLAB Software for Disciplined Convex Programming","year":"2008","author":"grant","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1137\/1035089"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2016.7905986"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2016.7842062"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/sec.110"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2017.7925912"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2011.5751298"},{"key":"ref7","first-page":"26","article-title":"New Threats and Innovative Protection Methods in Wireless Transmission Systems","volume":"3","author":"bilski","year":"2014","journal-title":"J Telecom Info Tech"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2015.2432513"},{"journal-title":"Visible Light Communications (VLC) Technology","year":"2000","author":"ndjiongue","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2014.7063485"}],"event":{"name":"2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","start":{"date-parts":[[2017,10,8]]},"location":"Montreal, QC","end":{"date-parts":[[2017,10,13]]}},"container-title":["2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8288420\/8292162\/08292592.pdf?arnumber=8292592","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,26]],"date-time":"2018-03-26T17:04:56Z","timestamp":1522083896000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8292592\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/pimrc.2017.8292592","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}