{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T16:25:44Z","timestamp":1725985544217},"publisher-location":"Singapore","reference-count":33,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811310553"},{"type":"electronic","value":"9789811310560"}],"license":[{"start":{"date-parts":[[2018,7,24]],"date-time":"2018-07-24T00:00:00Z","timestamp":1532390400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-1056-0_30","type":"book-chapter","created":{"date-parts":[[2018,7,23]],"date-time":"2018-07-23T16:30:31Z","timestamp":1532363431000},"page":"285-293","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Secrecy Analysis in the AF Mode Cooperative Communication System"],"prefix":"10.1007","author":[{"given":"Hsin-Ying","family":"Liang","sequence":"first","affiliation":[]},{"given":"Cheng-Ying","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Min-Shiang","family":"Hwang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,24]]},"reference":[{"issue":"1","key":"30_CR1","first-page":"32","volume":"7","author":"R Singh","year":"2017","unstructured":"Singh R, Manu MS (2017) An energy efficient grid based static node deployment strategy for wireless sensor networks. Int J Electron Inf Eng 7(1):32\u201340","journal-title":"Int J Electron Inf Eng"},{"issue":"1","key":"30_CR2","first-page":"1","volume":"8","author":"A Rana","year":"2018","unstructured":"Rana A, Sharma D (2018) Mobile ad-hoc clustering using inclusive particle swarm optimization algorithm. Int J Electron Inf Eng 8(1):1\u20138","journal-title":"Int J Electron Inf Eng"},{"issue":"9","key":"30_CR3","doi-asserted-by":"publisher","first-page":"5135","DOI":"10.1109\/TWC.2015.2433291","volume":"14","author":"X Chen","year":"2015","unstructured":"Chen X, Lei L, Zhang H, Yuen C (2015) Large-scale MIMO relaying techniques for physical layer security: AF or DF? IEEE Trans Wirel Commun 14(9):5135\u20135146","journal-title":"IEEE Trans Wirel Commun"},{"issue":"10","key":"30_CR4","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/MCOM.2004.1341264","volume":"42","author":"A Nosratinia","year":"2004","unstructured":"Nosratinia A, Hunter TE, Hedayat A (2004) Cooperative communication in wireless networks. IEEE Commun Mag 42(10):74\u201380","journal-title":"IEEE Commun Mag"},{"issue":"2","key":"30_CR5","first-page":"57","volume":"5","author":"S Agarwal","year":"2016","unstructured":"Agarwal S, Kansal T (2016) Congestion control schemes in ATM networks for ABR services: an overview. Int J Electron Inf Eng 5(2):57\u201367","journal-title":"Int J Electron Inf Eng"},{"issue":"9","key":"30_CR6","doi-asserted-by":"publisher","first-page":"3037","DOI":"10.1109\/TIT.2005.853304","volume":"51","author":"G Kramer","year":"2005","unstructured":"Kramer G, Gastpar M, Gupta P (2005) Cooperative strategies and capacity theorems for relay networks. IEEE Trans Inf Theory 51(9):3037\u20133063","journal-title":"IEEE Trans Inf Theory"},{"issue":"3","key":"30_CR7","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1109\/TMC.2012.38","volume":"12","author":"Y Wang","year":"2013","unstructured":"Wang Y, Noubir G (2013) Distributed cooperation and diversity for hybrid wireless networks. IEEE Trans Mobile Comput 12(3):596\u2013608","journal-title":"IEEE Trans Mobile Comput"},{"issue":"6","key":"30_CR8","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1049\/el:20073267","volume":"43","author":"A Bletsas","year":"2007","unstructured":"Bletsas A, Shin H, Win MZ (2007) Outage analysis for cooperative communication with multiple amplify and forward relays. Electron Lett 43(6):51\u201352","journal-title":"Electron Lett"},{"issue":"1","key":"30_CR9","first-page":"49","volume":"12","author":"CY Yang","year":"2014","unstructured":"Yang CY, Lin YS, Wen JH (2014) Greedy algorithm applied relay selection for cooperative communication systems in amplify-and-forward mode. J Electron Sci Technol 12(1):49\u201353","journal-title":"J Electron Sci Technol"},{"issue":"6","key":"30_CR10","first-page":"1041","volume":"18","author":"H Choudhury","year":"2016","unstructured":"Choudhury H, Roychoudhury B, Saikia DKr (2016) Security extension for relaxed trust requirement in non3GPP access to the EPS hiten Choudhury. Int J Netw Secur 18(6):1041\u20131053","journal-title":"Int J Netw Secur"},{"issue":"6","key":"30_CR11","first-page":"940","volume":"19","author":"L He","year":"2017","unstructured":"He L, Chen Y, Hu X, Qin Z (2017) An efficient and provably secure certificateless key insulated encryption with applications to mobile internet. Int J Netw Secur 19(6):940\u2013949","journal-title":"Int J Netw Secur"},{"issue":"2","key":"30_CR12","first-page":"396","volume":"20","author":"SY Chiou","year":"2018","unstructured":"Chiou SY, Ko WT, Lu EH (2018) A secure ECC-based mobile RFID mutual authentication protocol and its application. Int J Netw Secur 20(2):396\u2013402","journal-title":"Int J Netw Secur"},{"issue":"3","key":"30_CR13","first-page":"421","volume":"19","author":"K Arthi","year":"2017","unstructured":"Arthi K, Reddy MC (2017) A secure and efficient privacy-preserving attribute matchmaking protocol for mobile social networks. Int J Netw Secur 19(3):421\u2013429","journal-title":"Int J Netw Secur"},{"issue":"5","key":"30_CR14","first-page":"832","volume":"19","author":"LT Ngoc","year":"2017","unstructured":"Ngoc LT, Tu VT (2017) Whirlwind: a new method to attack routing protocol in mobile ad hoc network. Int J Netw Secur 19(5):832\u2013838","journal-title":"Int J Netw Secur"},{"issue":"8","key":"30_CR15","doi-asserted-by":"publisher","first-page":"2710","DOI":"10.1016\/j.adhoc.2013.05.003","volume":"11","author":"T Kothmayr","year":"2013","unstructured":"Kothmayr T, Schmitt C, Hu W, Br\u00fcnig M, Carle G (2013) DTLS based security and two-way authentication for the Internet of Things. Ad Hoc Netw 11(8):2710\u20132723","journal-title":"Ad Hoc Netw"},{"issue":"6","key":"30_CR16","first-page":"904","volume":"19","author":"G Hou","year":"2017","unstructured":"Hou G, Wang Z (2017) A robust and efficient remote authentication scheme from elliptic curve cryptosystem. Int J Netw Secur 19(6):904\u2013911","journal-title":"Int J Netw Secur"},{"issue":"2","key":"30_CR17","first-page":"354","volume":"18","author":"Q Qian","year":"2016","unstructured":"Qian Q, Jia YL, Zhang R (2016) A lightweight RFID security protocol based on elliptic curve cryptography. Int J Netw Secur 18(2):354\u2013361","journal-title":"Int J Netw Secur"},{"issue":"2","key":"30_CR18","first-page":"390","volume":"20","author":"X Zhang","year":"2018","unstructured":"Zhang X, Wang B, Wang W (2018) A new remote authentication scheme for anonymous users using elliptic curves cryptosystem. Int J Netw Secur 20(2):390\u2013395","journal-title":"Int J Netw Secur"},{"issue":"3","key":"30_CR19","first-page":"469","volume":"19","author":"L Han","year":"2017","unstructured":"Han L, Xie Q, Liu W (2017) An improved biometric based authentication scheme with user anonymity using elliptic curve cryptosystem. Int J Netw Secur 19(3):469\u2013478","journal-title":"Int J Netw Secur"},{"issue":"8","key":"30_CR20","doi-asserted-by":"publisher","first-page":"4599","DOI":"10.1109\/TWC.2014.2314654","volume":"13","author":"DWK Ng","year":"2014","unstructured":"Ng DWK, Lo ES, Schober R (2014) Robust beamforming for secure communication in systems with wireless information and power transfer. IEEE Trans Wirel Commun 13(8):4599\u20134615","journal-title":"IEEE Trans Wirel Commun"},{"issue":"5","key":"30_CR21","first-page":"761","volume":"19","author":"S Goswami","year":"2017","unstructured":"Goswami S, Hoque N, Bhattacharyya DK, Kalita J (2017) An unsupervised method for detection of XSS attack. Int J Netw Secur 19(5):761\u2013775","journal-title":"Int J Netw Secur"},{"issue":"6","key":"30_CR22","first-page":"1130","volume":"18","author":"W Srichavengsup","year":"2016","unstructured":"Srichavengsup W, San-Um W (2016) Data encryption scheme based on rules of cellular automata and chaotic map function for information security. Int J Netw Secur 18(6):1130\u20131142","journal-title":"Int J Netw Secur"},{"issue":"2","key":"30_CR23","first-page":"208","volume":"17","author":"D Xu","year":"2015","unstructured":"Xu D, Wu Z, Wu Z, Zhang Q, Qin L, Zhou J (2015) Internet of Things: hotspot-based discovery service architecture with security mechanism. Int J Netw Secur 17(2):208\u2013216","journal-title":"Int J Netw Secur"},{"key":"30_CR24","doi-asserted-by":"crossref","unstructured":"Porambage P, Schmitt C, Kumar P, Gurtov A, Ylianttila M (2014) Two-phase authentication protocol for wireless sensor networks in distributed IoT applications. In: Proceedings of the 2014 IEEE wireless communications and networking conference, Istanbul, Turkey, pp 2728\u20132733","DOI":"10.1109\/WCNC.2014.6952860"},{"issue":"3","key":"30_CR25","first-page":"459","volume":"18","author":"A Mayzaud","year":"2016","unstructured":"Mayzaud A, Badonnel R, Chrisment I (2016) A taxonomy of attacks in RPL-based internet of things. Int J Netw Secur 18(3):459\u2013473","journal-title":"Int J Netw Secur"},{"issue":"4","key":"30_CR26","first-page":"631","volume":"19","author":"Y Ma","year":"2017","unstructured":"Ma Y (2017) NFC communications-based mutual authentication scheme for the Internet of Things. Int J Netw Secur 19(4):631\u2013638","journal-title":"Int J Netw Secur"},{"key":"30_CR27","doi-asserted-by":"crossref","unstructured":"Bloch M, Barros J (2011) Physical-layer security from information theory to security engineering. Cambridge","DOI":"10.1017\/CBO9780511977985"},{"issue":"4","key":"30_CR28","first-page":"648","volume":"19","author":"WL Tai","year":"2017","unstructured":"Tai WL, Chang YF (2017) Comments on a secure authentication scheme for IoT and cloud servers. Int J Netw Secur 19(4):648\u2013651","journal-title":"Int J Netw Secur"},{"issue":"1","key":"30_CR29","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MNET.2015.7018202","volume":"29","author":"Y Zou","year":"2015","unstructured":"Zou Y, Zhu J, Wang X, Leung V (2015) Improving physical-layer security in wireless communications using diversity techniques. IEEE Netw 29(1):42\u201348","journal-title":"IEEE Netw"},{"issue":"3","key":"30_CR30","first-page":"439","volume":"20","author":"Q Wang","year":"2018","unstructured":"Wang Q, Zhang H, Lyu Q, Wang X, Bao J (2018) A novel physical channel characteristics-based channel hopping scheme for jamming-resistant in wireless communication. Int J Netw Secur 20(3):439\u2013446","journal-title":"Int J Netw Secur"},{"key":"30_CR31","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"29","author":"CE Shannon","year":"1949","unstructured":"Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 29:656\u2013715","journal-title":"Bell Syst Tech J"},{"key":"30_CR32","unstructured":"Barros J, Rodrigues MR (2016) Secrecy capacity of wireless channels. In: Proceedings of 2006 IEEE international symposium on information theory, pp 356\u2013360"},{"issue":"6","key":"30_CR33","first-page":"863","volume":"19","author":"JS Chen","year":"2017","unstructured":"Chen JS, Yang CY, Hwang MS (2017) The capacity analysis in the secure cooperative communication system. Int J Netw Secur 19(6):863\u2013869","journal-title":"Int J Netw Secur"}],"container-title":["Lecture Notes in Electrical Engineering","Information Science and Applications 2018"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-1056-0_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,23]],"date-time":"2018-07-23T16:43:34Z","timestamp":1532364214000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-1056-0_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,24]]},"ISBN":["9789811310553","9789811310560"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-1056-0_30","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2018,7,24]]}}}