{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:01:58Z","timestamp":1729634518326,"version":"3.28.0"},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,12]]},"DOI":"10.1109\/glocom.2010.5683460","type":"proceedings-article","created":{"date-parts":[[2011,1,10]],"date-time":"2011-01-10T21:19:12Z","timestamp":1294694352000},"page":"1-5","source":"Crossref","is-referenced-by-count":9,"title":["Techniques for Enhanced Physical-Layer Security"],"prefix":"10.1109","author":[{"given":"Pedro C.","family":"Pinto","sequence":"first","affiliation":[]},{"given":"Joao","family":"Barros","sequence":"additional","affiliation":[]},{"given":"Moe Z.","family":"Win","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ITA.2010.5454119"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2009.5205992"},{"key":"ref31","first-page":"1","article-title":"Secure communication in stochastic wireless networks","author":"pinto","year":"2009","journal-title":"IEEE Trans Inf Theory"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICCS.2008.4737329"},{"journal-title":"Stochastic Geometry and its Applications","year":"1995","author":"stoyan","key":"ref37"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2009.090902"},{"journal-title":"Poisson Processes","year":"1993","author":"kingman","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ISITA.2010.5649155"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2009.5394527"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2005.1605889"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2009.5206050"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2008.4595384"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2005.1523727"},{"key":"ref15","article-title":"On the Secrecy Capacity of Fading Channels","author":"gopala","year":"2006","journal-title":"Arxiv preprint cs IT\/0604107"},{"key":"ref16","first-page":"841","article-title":"Secrecy capacity of independent parallel channels","author":"li","year":"2006","journal-title":"Proc Annu Allerton Conf Communication Control and Computing"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921908"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921678"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1007\/3-540-45539-6_24","article-title":"Information-theoretic key agreement: From weak to strong secrecy for free","volume":"1807","author":"maurer","year":"2000","journal-title":"EUROCRYPT 2000 Lecture Notes in Computer Science"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1093\/ietfec\/e89-a.7.2036"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055917"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2007.4313097"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055892"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2005.1558439"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2008.4595044"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.820010"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2018322"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2009.5205959"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2030458"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"ref20","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-85093-9_5","article-title":"Strong secrecy for wireless channels","author":"barros","year":"2008","journal-title":"Proc International Conf on Inf Theor Security"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/18.243431"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/18.748999"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/18.476316"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.901143"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2006.261991"}],"event":{"name":"GLOBECOM 2010 - 2010 IEEE Global Communications Conference","start":{"date-parts":[[2010,12,6]]},"location":"Miami, FL, USA","end":{"date-parts":[[2010,12,10]]}},"container-title":["2010 IEEE Global Telecommunications Conference GLOBECOM 2010"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5682081\/5683069\/05683460.pdf?arnumber=5683460","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T19:03:28Z","timestamp":1559934208000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5683460\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/glocom.2010.5683460","relation":{},"subject":[],"published":{"date-parts":[[2010,12]]}}}