{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T14:52:15Z","timestamp":1761663135416,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,11]]},"DOI":"10.1109\/iccs.2012.6406109","type":"proceedings-article","created":{"date-parts":[[2013,1,17]],"date-time":"2013-01-17T15:26:26Z","timestamp":1358436386000},"page":"60-64","source":"Crossref","is-referenced-by-count":13,"title":["A zero-sum power allocation game in the parallel Gaussian wiretap channel with an unfriendly jammer"],"prefix":"10.1109","author":[{"given":"Munnujahan","family":"Ara","sequence":"first","affiliation":[]},{"given":"Hugo","family":"Reboredo","sequence":"additional","affiliation":[]},{"given":"Samah A. M.","family":"Ghanem","sequence":"additional","affiliation":[]},{"given":"Miguel R. D.","family":"Rodrigues","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","first-page":"2527","article-title":"Multiple-antenna capacity in the low-power regime,\" information theory","volume":"49","author":"lozano","year":"2003","journal-title":"IEEE Transactions on"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/35.852034"},{"journal-title":"Two Person Zero-sum Games 3rd edition","year":"2003","author":"washburn","key":"13"},{"journal-title":"Theory In Games Programming Economics","year":"1959","author":"karlin","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2009.5351368"},{"key":"12","first-page":"27","article-title":"Secrecy capacity of independent parallel channels","author":"li","year":"2006","journal-title":"44th Annual Allerton Conference on Communication Control and Computing"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"2","first-page":"4","article-title":"Information theoretic security","volume":"5","author":"liang","year":"2008","journal-title":"Foundations and Trends in Communications and Information Theory"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921908"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2119730"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2027577"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7091-2640-0_8"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055892"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2010.5502606"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2010.5502588"}],"event":{"name":"2012 IEEE International Conference on Communication Systems (ICCS)","start":{"date-parts":[[2012,11,21]]},"location":"Singapore, Singapore","end":{"date-parts":[[2012,11,23]]}},"container-title":["2012 IEEE International Conference on Communication Systems (ICCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6391317\/6406092\/06406109.pdf?arnumber=6406109","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T14:38:12Z","timestamp":1490193492000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6406109\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,11]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/iccs.2012.6406109","relation":{},"subject":[],"published":{"date-parts":[[2012,11]]}}}