{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T04:40:02Z","timestamp":1748580002259,"version":"3.41.0"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319234397"},{"type":"electronic","value":"9783319234403"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-23440-3_4","type":"book-chapter","created":{"date-parts":[[2015,8,24]],"date-time":"2015-08-24T15:13:17Z","timestamp":1440429197000},"page":"47-56","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Sequential Incomplete Information Game in Relay Networks Based on Wireless Physical Layer Network Coding"],"prefix":"10.1007","author":[{"given":"Tomas","family":"Hynek","sequence":"first","affiliation":[]},{"given":"Jan","family":"Sykora","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,25]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Zhang, S., Liew, S.C., Lam, P.P.: Hot topic: physical-layer network coding. In: Proceedings of the 12th Annual International Conference on Mobile Computing and Networking, MobiCom 2006, New York, NY, USA, pp. 358\u2013365. ACM (2006)","DOI":"10.1145\/1161089.1161129"},{"issue":"4","key":"4_CR2","doi-asserted-by":"publisher","first-page":"1204","DOI":"10.1109\/18.850663","volume":"46","author":"R Ahlswede","year":"2000","unstructured":"Ahlswede, R., Cai, N., Li, S.-Y., Yeung, R.: Network information flow. IEEE Transactions on Information Theory 46(4), 1204\u20131216 (2000)","journal-title":"IEEE Transactions on Information Theory"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Rankov, B., Wittneben, A.: Achievable rate regions for the two-way relay channel. In: Proc. IEEE Int. Symposium on Information Theory (ISIT), July 2006. http:\/\/www.nari.ee.ethz.ch\/wireless\/pubs\/p\/isit2006","DOI":"10.1109\/ISIT.2006.261638"},{"issue":"4","key":"4_CR4","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1145\/1282427.1282425","volume":"37","author":"S Katti","year":"2007","unstructured":"Katti, S., Gollakota, S., Katabi, D.: Embracing wireless interference: Analog network coding. SIGCOMM Comput. Commun. Rev. 37(4), 397\u2013408 (2007)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"issue":"10","key":"4_CR5","doi-asserted-by":"publisher","first-page":"6463","DOI":"10.1109\/TIT.2011.2165816","volume":"57","author":"B Nazer","year":"2011","unstructured":"Nazer, B., Gastpar, M.: Compute-and-forward: Harnessing interference through structured codes. IEEE Transactions on Information Theory 57(10), 6463\u20136486 (2011)","journal-title":"IEEE Transactions on Information Theory"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Popovski, P., Yomo, H.: Bi-directional amplification of throughput in a wireless multi-hop network. In: IEEE 63rd Vehicular Technology Conference, VTC 2006-Spring, vol. 2, pp. 588\u2013593, May 2006","DOI":"10.1109\/VETECS.2006.1682892"},{"issue":"3","key":"4_CR7","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1109\/TNET.2008.923722","volume":"16","author":"S Katti","year":"2008","unstructured":"Katti, S., Rahul, H., Hu, W., Katabi, D., Medard, M., Crowcroft, J.: XORs in the air: Practical wireless network coding. IEEE\/ACM Transactions on Networking 16(3), 497\u2013510 (2008)","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"7","key":"4_CR8","doi-asserted-by":"publisher","first-page":"3241","DOI":"10.1109\/TVT.2011.2160105","volume":"60","author":"J Sykora","year":"2011","unstructured":"Sykora, J., Burr, A.: Layered design of hierarchical exclusive codebook and its capacity regions for HDF strategy in parametric wireless 2-WRC. IEEE Transactions on Vehicular Technology 60(7), 3241\u20133252 (2011)","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Wang, W., Chatterjee, M., Kwiat, K.: Coexistence with malicious nodes: a game theoretic approach. In: International Conference on Game Theory for Networks, GameNets 2009, pp. 277\u2013286, May 2009","DOI":"10.1109\/GAMENETS.2009.5137411"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Dehnie, S., Sencar, H., Memon, N.: Detecting malicious behavior in cooperative diversity. In: 41st Annual Conference on Information Sciences and Systems, CISS 2007, pp. 895\u2013899, March 2007","DOI":"10.1109\/CISS.2007.4298437"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Chen, M.-H., Lin, S.-C., Hong, Y.-W.: A game theoretic approach for the cooperative network with the presence of malicious relays. In: 2011 IEEE Global Telecommunications Conference (GLOBECOM 2011), pp. 1\u20135, December 2011","DOI":"10.1109\/GLOCOM.2011.6134206"},{"key":"4_CR12","unstructured":"Fudenberg, D., Tirole, J.: Game Theory. MIT Press (1991)"}],"container-title":["Lecture Notes in Computer Science","Multiple Access Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-23440-3_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T04:03:03Z","timestamp":1748577783000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-23440-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319234397","9783319234403"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-23440-3_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"25 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}