{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:25:13Z","timestamp":1740133513605,"version":"3.37.3"},"reference-count":27,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2015,5,1]],"date-time":"2015-05-01T00:00:00Z","timestamp":1430438400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"publisher","award":["100-2628-E-007-025-MY3","101-2221-E-011-170-MY3"],"award-info":[{"award-number":["100-2628-E-007-025-MY3","101-2221-E-011-170-MY3"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Industrial Technology Research Institute, Taiwan","award":["E301AR2900"],"award-info":[{"award-number":["E301AR2900"]}]},{"name":"US National Science Foundation","award":["CNS 09-64632","CCF 09-64645","CCF 10-18185","CNS 11-47811"],"award-info":[{"award-number":["CNS 09-64632","CCF 09-64645","CCF 10-18185","CNS 11-47811"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Wireless Commun."],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/twc.2015.2390234","type":"journal-article","created":{"date-parts":[[2015,1,9]],"date-time":"2015-01-09T19:53:20Z","timestamp":1420833200000},"page":"2655-2669","source":"Crossref","is-referenced-by-count":23,"title":["Secure Degrees of Freedom of MIMO Rayleigh Block Fading Wiretap Channels With No CSI Anywhere"],"prefix":"10.1109","volume":"14","author":[{"given":"Ta-Yuan","family":"Liu","sequence":"first","affiliation":[]},{"given":"Pritam","family":"Mukherjee","sequence":"additional","affiliation":[]},{"given":"Sennur","family":"Ulukus","sequence":"additional","affiliation":[]},{"given":"Shih-Chun","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Y.-W.","family":"Peter Hong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-1385-2_1"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921678"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-1385-2"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.928990"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.080210.090948"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.041714.11654"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2359192"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2266924"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2012.6284224"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2007.4557522"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055917"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055892"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2068852"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2025549"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2018322"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2158487"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"ref9","first-page":"817","article-title":"Secure communication over fading channels","author":"liang","year":"0","journal-title":"Proc 44th Annu Allerton Conf Commun Control Comput"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2013.6620446"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/18.978730"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/18.746779"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/18.556128"},{"journal-title":"Elements of Information Theory","year":"2006","author":"cover","key":"ref23"},{"key":"ref26","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-68276-1","author":"marshall","year":"2011","journal-title":"Inequalities Theory of Majorization and Its Applications"},{"journal-title":"Matrix Analysis","year":"1990","author":"horn","key":"ref25"}],"container-title":["IEEE Transactions on Wireless Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7693\/7103375\/07005540.pdf?arnumber=7005540","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:01:57Z","timestamp":1642003317000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7005540\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":27,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/twc.2015.2390234","relation":{},"ISSN":["1536-1276","1558-2248"],"issn-type":[{"type":"print","value":"1536-1276"},{"type":"electronic","value":"1558-2248"}],"subject":[],"published":{"date-parts":[[2015,5]]}}}