{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T17:24:34Z","timestamp":1649179474923},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,10,26]],"date-time":"2016-10-26T00:00:00Z","timestamp":1477440000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1186\/s13638-016-0755-5","type":"journal-article","created":{"date-parts":[[2016,10,26]],"date-time":"2016-10-26T12:41:35Z","timestamp":1477485695000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Successive optimization Tomlinson-Harashima precoding strategies for physical-layer security in wireless networks"],"prefix":"10.1186","volume":"2016","author":[{"given":"Xiaotao","family":"Lu","sequence":"first","affiliation":[]},{"given":"Rodrigo C.","family":"de Lamare","sequence":"additional","affiliation":[]},{"given":"Keke","family":"Zu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,26]]},"reference":[{"key":"755_CR1","unstructured":"S Soni, H Agrawal, M Sharma, Analysis and comparison between AES and DES cryptographic algorithm. Int.J. Eng. Innov. Technol. (IJEIT). 2(3) (2012)."},{"issue":"4","key":"755_CR2","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C Shannon","year":"1949","unstructured":"C Shannon, Communication theory of secrecy systems. Bell Syst. Tech. J.28(4), 656\u2013715 (1949).","journal-title":"Bell Syst. Tech. J."},{"issue":"8","key":"755_CR3","doi-asserted-by":"publisher","first-page":"1385","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"AD Wyner","year":"1975","unstructured":"AD Wyner, The wire-tap channel. Bell Syst. Techn. J. 54(8), 1385\u20131357 (1975).","journal-title":"Bell Syst. Techn. J"},{"issue":"3","key":"755_CR4","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1109\/TIT.1978.1055892","volume":"24","author":"I Csisz\u00e1r","year":"1978","unstructured":"I Csisz\u00e1r, J K\u00f6rner, Broadcast channels with confidential messages. IEEE Trans. Inf. Theory. 24(3), 339\u2013348 (1978).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"4","key":"755_CR5","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1109\/TIT.1978.1055917","volume":"24","author":"S Leung-Yan-Cheong","year":"1978","unstructured":"S Leung-Yan-Cheong, M Hellman, The Gaussian wire-tap channel. IEEE Trans. Inf. Theory. 24(4), 451\u2013456 (1978).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"8","key":"755_CR6","doi-asserted-by":"publisher","first-page":"4961","DOI":"10.1109\/TIT.2011.2158487","volume":"57","author":"F Oggier","year":"2011","unstructured":"F Oggier, B Hassibi, The secrecy capacity of the mimo wiretap channel. IEEE Trans. Inf. Theory. 57(8), 4961\u20134972 (2011).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"6","key":"755_CR7","doi-asserted-by":"publisher","first-page":"2180","DOI":"10.1109\/TWC.2008.060848","volume":"7","author":"S Goel","year":"2008","unstructured":"S Goel, R Negi, Guaranteeing secrecy using artificial noise. IEEE Trans. Wirel. Commun. 7(6), 2180\u20132189 (2008).","journal-title":"IEEE Trans. Wirel. Commun"},{"issue":"1","key":"755_CR8","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/TSP.2012.2222386","volume":"61","author":"A Mukherjee","year":"2013","unstructured":"A Mukherjee, A Swindlehurst, Jamming games in the MIMO wiretap channel with an active eavesdropper. IEEE Trans. Signal Process. 61(1), 82\u201391 (2013).","journal-title":"IEEE Trans. Signal Process"},{"issue":"3","key":"755_CR9","doi-asserted-by":"publisher","first-page":"953","DOI":"10.1109\/LCOMM.2008.060709","volume":"7","author":"V Stankovic","year":"2008","unstructured":"V Stankovic, M Haardt, Generalized design of multi-user MIMO precoding matrices. IEEE Trans. Wirel. Commun. 7(3), 953\u2013961 (2008).","journal-title":"IEEE Trans. Wirel. Commun"},{"key":"755_CR10","unstructured":"Y Cai, DL Ruyet, RC de Lamare, D Roviras, in IEEE 12th International Workshop, Signal Processing Advances in Wireless Communications (SPAWC). Linear precoding based on switched relaying processing for multiuser MIMO relay systems, (2011), pp. 351\u2013355."},{"issue":"11","key":"755_CR11","doi-asserted-by":"publisher","first-page":"3472","DOI":"10.1109\/TCOMM.2012.072612.110686","volume":"60","author":"G Geraci","year":"2012","unstructured":"G Geraci, M Egan, J Yuan, A Razi, IB Collings, Secrecy sum-rates for multi-user MIMO regularized channel inversion precoding. IEEE Trans. Commun. 60(11), 3472\u20133482 (2012).","journal-title":"IEEE Trans. Commun"},{"key":"755_CR12","unstructured":"M Payaro, A Perez-Neira, M Lagunas, in IEEE 60th Vehicular Technology Conference, 4. Achievable rates for generalized spatial Tomlinson-Harashima precoding in MIMO systems, (2004), pp. 2462\u20132466."},{"issue":"9","key":"755_CR13","doi-asserted-by":"publisher","first-page":"3946","DOI":"10.1109\/TVT.2012.2210957","volume":"61","author":"M Mazrouei-Sebdani","year":"2012","unstructured":"M Mazrouei-Sebdani, W Krzymien, Vector perturbation precoding for network MIMO: sum rate, fair user scheduling, and impact of backhaul delay. IEEE Trans. Veh. Technol. 61(9), 3946\u20133957 (2012).","journal-title":"IEEE Trans. Veh. Technol"},{"issue":"9","key":"755_CR14","doi-asserted-by":"publisher","first-page":"1728","DOI":"10.1109\/JSAC.2013.130907","volume":"31","author":"P Lin","year":"2013","unstructured":"P Lin, S Lai, S Lin, On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels. IEEE J.Sel. Areas Commun. 31(9), 1728\u20131740 (2013).","journal-title":"IEEE J.Sel. Areas Commun"},{"key":"755_CR15","doi-asserted-by":"crossref","unstructured":"A Chorti, H Poor, Achievable secrecy rates in physical layer secure systems with a helping interferer. Comput. Netw. Commun. (ICNC), 18\u201322 (2012).","DOI":"10.1109\/ICCNC.2012.6167408"},{"key":"755_CR16","unstructured":"H Yao, W Wornell, in Global Telecommunications Conference, 1. Lattice-reduction-aided detectors for MIMO communication systems, (2002), pp. 424\u2013428."},{"issue":"12","key":"755_CR17","doi-asserted-by":"publisher","first-page":"4801","DOI":"10.1109\/TIT.2007.909169","volume":"53","author":"M Taherzadeh","year":"2007","unstructured":"M Taherzadeh, A Mobasher, A Khandani, Lll reduction achieves the receive diversity in MIMO decoding. IEEE Trans. Inf. Theory. 53(12), 4801\u20134805 (2007).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"755_CR18","unstructured":"V Stankovic, M Haardt, in IEEE International Conference, Proceedings.(ICASSP \u201905), 3. Successive optimization Tomlinson-Harashima precoding (SO THP) for multi-user MIMO systems, (2005), pp. 1117\u20131120."},{"issue":"2","key":"755_CR19","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1109\/TSP.2006.885713","volume":"55","author":"F Dietrich","year":"2007","unstructured":"F Dietrich, P Breun, W Utschick, Robust Tomlinson\u2013Harashima precoding for the wireless broadcast channel. IEEE Trans.Signal Process. 55(2), 631\u2013644 (2007).","journal-title":"IEEE Trans.Signal Process"},{"issue":"11","key":"755_CR20","doi-asserted-by":"publisher","first-page":"3489","DOI":"10.1109\/TCOMM.2009.11.070404","volume":"57","author":"S Hakjea","year":"2009","unstructured":"S Hakjea, L Sang-Rim, L Inkyu, Generalized channel inversion methods for multiuser MIMO systems. IEEE Trans.Commun. 57(11), 3489\u20133499 (2009).","journal-title":"IEEE Trans.Commun"},{"issue":"10","key":"755_CR21","doi-asserted-by":"publisher","first-page":"4232","DOI":"10.1109\/TCOMM.2013.090513.130038","volume":"61","author":"K Zu","year":"2013","unstructured":"K Zu, RC de Lamare, M Haart, Generalized design of low-complexity block diagonalization type precoding algorithms for multiuser MIMO systems. IEEE Trans.Commun. 61(10), 4232\u20134242 (2013).","journal-title":"IEEE Trans.Commun"},{"issue":"3","key":"755_CR22","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1109\/TIT.1983.1056659","volume":"29","author":"M Costa","year":"1983","unstructured":"M Costa, Writing on dirty paper. IEEE Trans.Inf. Theory. 29(3), 439\u2013441 (1983).","journal-title":"IEEE Trans.Inf. Theory"},{"issue":"5","key":"755_CR23","doi-asserted-by":"publisher","first-page":"2856","DOI":"10.1109\/TVT.2007.914051","volume":"57","author":"M Huang","year":"2008","unstructured":"M Huang, S Zhou, J Wang, Analysis of Tomlinson-Harashima precoding in multiuser MIMO systems with imperfect channel state information. IEEE Trans.Veh. Technol. 57(5), 2856\u20132867 (2008).","journal-title":"IEEE Trans.Veh. Technol"},{"issue":"3","key":"755_CR24","doi-asserted-by":"publisher","first-page":"939","DOI":"10.1109\/TCOMM.2014.012514.130241","volume":"62","author":"K Zu","year":"2014","unstructured":"K Zu, RC de Lamare, M Haardt, Multi-branch Tomlinson-Harashima precoding design for MU-MIMO systems: theory and algorithms. IEEE Trans.Commun. 62(3), 939\u2013951 (2014).","journal-title":"IEEE Trans.Commun"},{"issue":"6","key":"755_CR25","doi-asserted-by":"publisher","first-page":"925","DOI":"10.1109\/LCOMM.2012.041112.112185","volume":"16","author":"K Zu","year":"2012","unstructured":"K Zu, RC de Lamare, Low-complexity lattice reduction-aided regularized block diagonalization for MU-MIMO systems. IEEE Commun.Lett. 16(6), 925\u2013928 (2012).","journal-title":"IEEE Commun.Lett"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0755-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-016-0755-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0755-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,15]],"date-time":"2019-09-15T01:56:56Z","timestamp":1568512616000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-016-0755-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,26]]},"references-count":25,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["755"],"URL":"https:\/\/doi.org\/10.1186\/s13638-016-0755-5","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,10,26]]},"article-number":"259"}}