{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T06:33:07Z","timestamp":1742970787177,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030058722"},{"type":"electronic","value":"9783030058739"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-05873-9_17","type":"book-chapter","created":{"date-parts":[[2019,1,17]],"date-time":"2019-01-17T11:18:49Z","timestamp":1547723929000},"page":"208-220","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Wireless Power Transfer Under Secure Communication with Multiple Antennas and Eavesdroppers"],"prefix":"10.1007","author":[{"given":"Duc-Dung","family":"Tran","sequence":"first","affiliation":[]},{"given":"Dac-Binh","family":"Ha","sequence":"additional","affiliation":[]},{"given":"Anand","family":"Nayyar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,18]]},"reference":[{"issue":"2","key":"17_CR1","doi-asserted-by":"publisher","first-page":"757","DOI":"10.1109\/COMST.2014.2368999","volume":"17","author":"X Lu","year":"2015","unstructured":"Lu, X., Wang, P., Niyato, D., Kim, D.I., Han, Z.: Wireless networks with RF energy harvesting: a contemporary survey. IEEE Commun. Surv. Tutor. 17(2), 757\u2013789 (2015)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"11","key":"17_CR2","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1109\/MCOM.2014.6957150","volume":"52","author":"I Krikidis","year":"2014","unstructured":"Krikidis, I., Timotheou, S., Nikolaou, S., Zheng, G., Ng, D.W.K., Schober, R.: Simultaneous wireless information and power transfer in modern communication systems. IEEE Commun. Mag. 52(11), 104\u2013110 (2014)","journal-title":"IEEE Commun. Mag."},{"issue":"5","key":"17_CR3","first-page":"90","volume":"21","author":"DB Ha","year":"2015","unstructured":"Ha, D.B., Tran, D.D., Tran, H.V., Hong, E.K.: Performance of amplify-and-forward relaying with wireless power transfer over dissimilar channels. Elektronika ir Elektrotechnika J. 21(5), 90\u201395 (2015)","journal-title":"Elektronika ir Elektrotechnika J."},{"issue":"6","key":"17_CR4","doi-asserted-by":"publisher","first-page":"2515","DOI":"10.1109\/TIT.2008.921908","volume":"54","author":"M Bloch","year":"2008","unstructured":"Bloch, M., Barros, J., Rodrigues, M.R., McLaughlin, S.W.: Wireless information-theoretic security. IEEE Trans. Inform. Theory 54(6), 2515\u20132534 (2008)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"4","key":"17_CR5","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1080\/03772063.2015.1021389","volume":"61","author":"DD Tran","year":"2015","unstructured":"Tran, D.D., Ha, D.-B., Tran-Ha, V., Hong, E.K.: Secrecy analysis with MRC\/SC-based eavesdropper over heterogeneous channels. IETE J. Res. 61(4), 363\u2013371 (2015)","journal-title":"IETE J. Res."},{"key":"17_CR6","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/LWC.2014.2365808","volume":"4","author":"Y Liu","year":"2015","unstructured":"Liu, Y., Wang, L., Duy, T.T., Elkashlan, M., Duong, T.Q.: Relay selection for security enhancement in cognitive relay networks. IEEE Wirel. Commun. Lett. 4, 46\u201349 (2015)","journal-title":"IEEE Wirel. Commun. Lett."},{"issue":"1","key":"17_CR7","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1109\/TCOMM.2012.12.110670","volume":"61","author":"N Yang","year":"2013","unstructured":"Yang, N., Yeoh, P.L., Elkashlan, M.: Transmit antenna selection for security enhancement in MIMO wiretap channels. IEEE Trans. Comm. 61(1), 144\u2013154 (2013)","journal-title":"IEEE Trans. Comm."},{"issue":"5","key":"17_CR8","doi-asserted-by":"publisher","first-page":"2462","DOI":"10.1109\/TVT.2013.2288318","volume":"63","author":"Q Li","year":"2014","unstructured":"Li, Q., Zhang, Q., Qin, J.: Secure relay beamforming for simultaneous wireless information and power transfer in nonregenerative relay networks. IEEE Trans. Veh. Technol. 63(5), 2462\u20132467 (2014)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"3","key":"17_CR9","doi-asserted-by":"publisher","first-page":"2199","DOI":"10.1109\/TVT.2016.2572960","volume":"66","author":"SS Kalamkar","year":"2017","unstructured":"Kalamkar, S.S., Banerjee, A.: Secure communication via a wireless energy harvesting untrusted relay. IEEE Trans. Veh. Technol. 66(3), 2199\u20132213 (2017)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Chen, X., Chen, J., Liu, T.: Secure wireless information and power transfer in large-scale MIMO relaying systems with imperfect CSI. In: IEEE GLOBECOM, pp. 4131\u20134136 (2014)","DOI":"10.1109\/GLOCOM.2014.7037455"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"He, B., Zhou, X.: On the placement of RF energy harvesting node in wireless networks with secrecy considerations. In: IEEE Globecom Workshops, pp. 1355\u20131360 (2014)","DOI":"10.1109\/GLOCOMW.2014.7063622"},{"issue":"1","key":"17_CR12","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1109\/TVT.2015.2395725","volume":"65","author":"H Xing","year":"2016","unstructured":"Xing, H., Liu, L., Zhang, R.: Secrecy wireless information and power transfer in fading wiretap channel. IEEE Trans. Veh. Technol. 65(1), 180\u2013190 (2016)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"5","key":"17_CR13","doi-asserted-by":"publisher","first-page":"2841","DOI":"10.1109\/TWC.2015.2395414","volume":"14","author":"Q Shi","year":"2015","unstructured":"Shi, Q., Xu, W., Wu, J., Song, E., Wang, Y.: Secure beamforming for MIMO broadcasting with wireless information and power transfer. IEEE Trans. Wirel. Commun. 14(5), 2841\u20132853 (2015)","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"8","key":"17_CR14","doi-asserted-by":"publisher","first-page":"4599","DOI":"10.1109\/TWC.2014.2314654","volume":"13","author":"DWK Ng","year":"2014","unstructured":"Ng, D.W.K., Lo, E.S., Schober, R.: Robust beamforming for secure communication in systems with wireless information and power transfer. IEEE Trans. Wirel. Commun. 13(8), 4599\u20134615 (2014)","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"7","key":"17_CR15","doi-asserted-by":"publisher","first-page":"3622","DOI":"10.1109\/TWC.2013.062413.122042","volume":"12","author":"AA Nasir","year":"2013","unstructured":"Nasir, A.A., Zhou, X., Durrani, S., Kennedy, R.A.: Relaying protocols for wireless energy harvesting and information processing. IEEE Trans. Wirel. Commun. 12(7), 3622\u20133636 (2013)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"17_CR16","volume-title":"Table of Integrals, Series, and Products","author":"I Gradshteyn","year":"2007","unstructured":"Gradshteyn, I., Ryzhik, I.: Table of Integrals, Series, and Products, 7th edn. Academic Press, Cambridge (2007)","edition":"7"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Industrial Networks and Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05873-9_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T01:06:16Z","timestamp":1558400776000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05873-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030058722","9783030058739"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05873-9_17","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"18 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INISCOM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Industrial Networks and Intelligent Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Da Nang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iniscom2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iniscom.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}