{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:48:03Z","timestamp":1742914083259,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319218366"},{"type":"electronic","value":"9783319218373"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-21837-3_62","type":"book-chapter","created":{"date-parts":[[2015,7,31]],"date-time":"2015-07-31T13:40:31Z","timestamp":1438350031000},"page":"634-643","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Information Security Enhancement with Actual Access Statuses of Users in the Multi-User System"],"prefix":"10.1007","author":[{"given":"Datong","family":"Xu","sequence":"first","affiliation":[]},{"given":"Pinyi","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Qinghe","family":"Du","sequence":"additional","affiliation":[]},{"given":"Li","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,1]]},"reference":[{"key":"62_CR1","unstructured":"3GPP (v 0.0.6).: Overview of 3GPP Release 13 (2014)"},{"issue":"1","key":"62_CR2","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/TPDS.2013.36","volume":"25","author":"HJ Zhu","year":"2014","unstructured":"Zhu, H.J., Du, S.G., Gao, Z.Y., Dong, M.X., Cao, Z.F.: A probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks. IEEE Trans. Parallel Distrib. Syst. 25(1), 22\u201332 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"62_CR3","doi-asserted-by":"publisher","unstructured":"Xu, Q.C., Su, Z., Han, B., Fang, D.F., Xu, Z.J., Gan, X.Y.: Analytical model with a novel selfishness division of mobile nodes to participate cooperation. Peer-to-Peer Netw. Appl. (2015). doi:10.1007\/s12083-015-0330-6","DOI":"10.1007\/s12083-015-0330-6"},{"key":"62_CR4","doi-asserted-by":"crossref","unstructured":"Su, Z., Xu, Q.C., Zhu, H.J., Wang, Y.: A novel design for content delivery over software defined mobile social networks. IEEE Netw. 29(4) (2015)","DOI":"10.1109\/MNET.2015.7166192"},{"issue":"2","key":"62_CR5","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/MCOM.2015.7045409","volume":"53","author":"J Calabuig","year":"2015","unstructured":"Calabuig, J., Monserrat, J.F., Gomez-Barquero, D.: 5th generation mobile networks: a new opportunity for the convergence of mobile broadband and broadcast services. IEEE Commun. Mag. 53(2), 198\u2013205 (2015)","journal-title":"IEEE Commun. Mag."},{"issue":"3","key":"62_CR6","doi-asserted-by":"publisher","first-page":"1550","DOI":"10.1109\/SURV.2014.012314.00178","volume":"16","author":"A Mukherjee","year":"2014","unstructured":"Mukherjee, A., Fakoorian, S.A.A., Huang, J., Swindlehurst, A.L.: Principles of physical layer security in multiuser wireless networks: a survey. IEEE Commun. Surv. Tutorials 16(3), 1550\u20131573 (2014)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"11","key":"62_CR7","doi-asserted-by":"publisher","first-page":"3056","DOI":"10.1109\/JPROC.2012.2188769","volume":"100","author":"A Barenghi","year":"2012","unstructured":"Barenghi, A., Breveglieri, L., Koren, I., Naccache, D.: Fault injection attacks on cryptographic devices: theory, practice, and countermeasures. proc. ieee. 100(11), 3056\u20133076 (2012)","journal-title":"proc. ieee."},{"issue":"4","key":"62_CR8","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MCOM.2015.7081071","volume":"53","author":"N Yang","year":"2015","unstructured":"Yang, N., Wang, L., Geraci, G., Elkashlan, M., Yuan, J., Renzo, M.D.: Safeguarding 5G wireless communication networks using physical layer security. IEEE Commun. Mag. 53(4), 20\u201327 (2015)","journal-title":"IEEE Commun. Mag."},{"issue":"9","key":"62_CR9","doi-asserted-by":"publisher","first-page":"1627","DOI":"10.1109\/LCOMM.2014.2343633","volume":"18","author":"J Zhang","year":"2014","unstructured":"Zhang, J., Yuen, C., Wen, C.K., Jin, S., Gao, X.: Ergodic secrecy sum-rate for multiuser downlink transmission via regularized channel inversion: large system analysis. IEEE Commun. Lett. 18(9), 1627\u20131630 (2014)","journal-title":"IEEE Commun. Lett."},{"issue":"9","key":"62_CR10","doi-asserted-by":"publisher","first-page":"1701","DOI":"10.1109\/JSAC.2013.130905","volume":"31","author":"SAA Fakoorian","year":"2013","unstructured":"Fakoorian, S.A.A., Swindlehurst, A.L.: On the optimality of linear precoding for secrecy in the MIMO broadcast channel. IEEE J. Sel. Areas Commun. 31(9), 1701\u20131713 (2013)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"9","key":"62_CR11","doi-asserted-by":"publisher","first-page":"1660","DOI":"10.1109\/JSAC.2013.130902","volume":"31","author":"G Geraci","year":"2013","unstructured":"Geraci, G., Couillet, R., Yuan, J., Debbah, M., Collings, I.B.: Large system analysis of linear precoding in MISO broadcast channels with confidential messages. IEEE J. Sel. Areas Commun. 31(9), 1660\u20131671 (2013)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"11","key":"62_CR12","doi-asserted-by":"publisher","first-page":"3472","DOI":"10.1109\/TCOMM.2012.072612.110686","volume":"60","author":"G Geraci","year":"2012","unstructured":"Geraci, G., Egan, M., Yuan, J., Razi, A., Collings, I.B.: Secrecy sumrates for multi-user MIMO regularized channel inversion precoding. IEEE Trans. Commun. 60(11), 3472\u20133482 (2012)","journal-title":"IEEE Trans. Commun."},{"issue":"9","key":"62_CR13","doi-asserted-by":"publisher","first-page":"4215","DOI":"10.1109\/TIT.2010.2054593","volume":"56","author":"R Liu","year":"2010","unstructured":"Liu, R., Liu, T., Poor, H.V., Shamai, S.: Multiple-input multiple-output Gaussian broadcast channels with confidential messages. IEEE Trans. Inf. Theory 56(9), 4215\u20134227 (2010)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"5","key":"62_CR14","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MCOM.2014.6815892","volume":"52","author":"V Jungnickel","year":"2014","unstructured":"Jungnickel, V., Manolakis, K., Zirwas, W., et al.: The role of small cells, coordinated multipoint, and massive MIMO in 5G. IEEE Commun. Mag. 52(5), 44\u201351 (2014)","journal-title":"IEEE Commun. Mag."},{"issue":"6","key":"62_CR15","doi-asserted-by":"publisher","first-page":"1798","DOI":"10.1109\/TWC.2011.040511.100519","volume":"10","author":"WWL Ho","year":"2011","unstructured":"Ho, W.W.L., Quek, T.Q.S., Sun, S., Heath, R.W.: Decentralized precoding for multicell MIMO downlink. IEEE Trans. Wirel. Commun. 10(6), 1798\u20131809 (2011)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"62_CR16","volume-title":"Handbook of Matrixes","author":"H Lutkepohl","year":"1997","unstructured":"Lutkepohl, H.: Handbook of Matrixes. Wiley, Chichester (1997)"},{"key":"62_CR17","volume-title":"Matrix Computations","author":"GH Golub","year":"1996","unstructured":"Golub, G.H., Loan, C.F.V.: Matrix Computations, 3rd edn. The John Hopkins University Press, Baltimore (1996)","edition":"3"},{"issue":"1","key":"62_CR18","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1109\/TSP.2014.2369001","volume":"63","author":"Q Li","year":"2015","unstructured":"Li, Q., Yang, Y., Ma, W.K., Lin, M., Ge, J.H., Lin, J.R.: Robust cooperative beamforming and artificial noise design for physical-layer secrecy in AF multi-antenna multi-relay networks. IEEE Trans. Signal Process. 63(1), 206\u2013220 (2015)","journal-title":"IEEE Trans. Signal Process."},{"key":"62_CR19","unstructured":"3GPP TS 36.104 (v11.3.0).: Evolved universal terrestrial radio access (E-UTRA); Base station (BS) radio transmission and reception. Release 11 (2012)"}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-21837-3_62","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,21]],"date-time":"2023-02-21T09:57:49Z","timestamp":1676973469000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-21837-3_62"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319218366","9783319218373"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-21837-3_62","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"1 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}