{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T04:29:16Z","timestamp":1774326556190,"version":"3.50.1"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319673790","type":"print"},{"value":"9783319673806","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-67380-6_24","type":"book-chapter","created":{"date-parts":[[2017,9,11]],"date-time":"2017-09-11T21:13:35Z","timestamp":1505164415000},"page":"258-269","source":"Crossref","is-referenced-by-count":1,"title":["Physical-Layer Security for DF Two-Way Dual-Hop Cooperative Wireless Networks over Nakagami-m Fading Channels"],"prefix":"10.1007","author":[{"given":"Islam M.","family":"Tanash","sequence":"first","affiliation":[]},{"given":"Mamoun F.","family":"Al-Mistarihi","sequence":"additional","affiliation":[]},{"given":"Amer M.","family":"Magableh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,13]]},"reference":[{"issue":"10","key":"24_CR1","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MCOM.2004.1341264","volume":"42","author":"A Nosratinia","year":"2004","unstructured":"Nosratinia, A., Hunter, T.E., Hedayat, A.: Cooperative communication in wireless networks. IEEE Commun. Mag. 42(10), 74\u201380 (2004)","journal-title":"IEEE Commun. Mag."},{"issue":"12","key":"24_CR2","doi-asserted-by":"crossref","first-page":"3062","DOI":"10.1109\/TIT.2004.838089","volume":"50","author":"JN Laneman","year":"2004","unstructured":"Laneman, J.N., Tse, D.N.C., Wornell, G.W.: Cooperative diversity in wireless networks: efficient protocols and outage behavior. IEEE Trans. Inf. Theory 50(12), 3062\u20133080 (2004)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"4","key":"24_CR3","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1109\/LCOMM.2008.071987","volume":"12","author":"I Krikidis","year":"2008","unstructured":"Krikidis, I., Thompson, J., Mclaughlin, S., Goertz, N.: Amplify-and-forward with partial relay selection. IEEE Commun. Lett. 12(4), 235\u2013237 (2008)","journal-title":"IEEE Commun. Lett."},{"issue":"11","key":"24_CR4","doi-asserted-by":"crossref","first-page":"3252","DOI":"10.1109\/TCOMM.2012.082712.120108","volume":"60","author":"M Xia","year":"2012","unstructured":"Xia, M., Aissa, S.: Cooperative AF relaying in spectrum-sharing systems: outage probability analysis under co-channel interferences and relay selection. IEEE Trans. Commun. 60(11), 3252\u20133262 (2012)","journal-title":"IEEE Trans. Commun."},{"issue":"8","key":"24_CR5","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"AD Wyner","year":"1975","unstructured":"Wyner, A.D.: The wire-tap channel. Bell Syst. Tech. J. 54(8), 1355\u20131367 (1975)","journal-title":"Bell Syst. Tech. J."},{"issue":"10","key":"24_CR6","doi-asserted-by":"crossref","first-page":"2099","DOI":"10.1109\/JSAC.2013.131011","volume":"31","author":"Z Yulong","year":"2013","unstructured":"Yulong, Z., Xianbin, W., Weiming, S.: Optimal relay selection for physical-layer security in cooperative wireless networks. IEEE J. Sel. Areas Commun. 31(10), 2099\u20132111 (2013)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"15","key":"24_CR7","doi-asserted-by":"crossref","first-page":"1787","DOI":"10.1049\/iet-com.2009.0634","volume":"4","author":"I Krikidis","year":"2010","unstructured":"Krikidis, I.: Opportunistic relay selection for cooperative networks with secrecy constraints. IET Commun. 4(15), 1787\u20131791 (2010)","journal-title":"IET Commun."},{"issue":"10","key":"24_CR8","doi-asserted-by":"crossref","first-page":"5003","DOI":"10.1109\/TWC.2009.090323","volume":"8","author":"I Krikidis","year":"2009","unstructured":"Krikidis, I., Thompson, J.S., McLaughlin, S.: Relay selection for secure cooperative networks with jamming. IEEE Trans. Wirel. Commun. 8(10), 5003\u20135011 (2009)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"24_CR9","doi-asserted-by":"crossref","first-page":"665","DOI":"10.1007\/s11277-013-1384-5","volume":"75","author":"DH Ibrahim","year":"2014","unstructured":"Ibrahim, D.H., Hassan, E.S., El-Dolil, S.A.: A new relay and jammer selection schemes for secure one-way cooperative networks. Wirel. Pers. Commun. 75, 665\u2013685 (2014). (Springer)","journal-title":"Wirel. Pers. Commun."},{"issue":"3","key":"24_CR10","doi-asserted-by":"crossref","first-page":"1741","DOI":"10.1007\/s11277-014-1956-z","volume":"79","author":"PN Son","year":"2014","unstructured":"Son, P.N., Kong, H.Y.: An integration of source and jammer for a decode-and-forward two-way scheme under physical layer security. Wirel. Pers. Commun. 79(3), 1741\u20131764 (2014). (Springer)","journal-title":"Wirel. Pers. Commun."}],"container-title":["Lecture Notes in Computer Science","Internet of Things, Smart Spaces, and Next Generation Networks and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67380-6_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,3]],"date-time":"2017-10-03T03:54:49Z","timestamp":1507002889000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-67380-6_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319673790","9783319673806"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67380-6_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}