{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T13:16:44Z","timestamp":1648646204154},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2016,10,19]],"date-time":"2016-10-19T00:00:00Z","timestamp":1476835200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1007\/s11036-016-0769-6","type":"journal-article","created":{"date-parts":[[2016,10,19]],"date-time":"2016-10-19T07:33:46Z","timestamp":1476862426000},"page":"1032-1042","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Quality of Protection in Cloud-Assisted Cognitive Machine-to-Machine Communications for Industrial Systems"],"prefix":"10.1007","volume":"21","author":[{"given":"Li","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Hui","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Sabita","family":"Maharjan","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,19]]},"reference":[{"issue":"2","key":"769_CR1","first-page":"201","volume":"23","author":"S Whitehead","year":"2004","unstructured":"Whitehead S (2004) Adopting wireless machine-to-machine technology. IEE Computing and Control Engineering J 23(2):201\u201320","journal-title":"IEE Computing and Control Engineering J"},{"issue":"3","key":"769_CR2","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/MNET.2012.6201210","volume":"26","author":"Y Zhang","year":"2012","unstructured":"Zhang Y, et al. (2012) Cognitive machine-to-machine communciations: Visions and potentials for the smart grid. IEEE Netw 26(3):6\u201313","journal-title":"IEEE Netw"},{"issue":"2","key":"769_CR3","first-page":"201","volume":"23","author":"S Haykin","year":"2005","unstructured":"Haykin S (2005) Cognitive radio: Brain-empowered wireless communciations. IEEE JSAC 23(2):201\u2013220","journal-title":"IEEE JSAC"},{"issue":"11","key":"769_CR4","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1109\/MCOM.2015.7321982","volume":"53","author":"JF Ding","year":"2015","unstructured":"Ding JF, Yu R, Zhang Y, Gjessing S, Tsang DHK (2015) Service provider competition and cooperation in cloud-based software defined wireless networks. IEEE Commun Mag 53(11):134\u2013140","journal-title":"IEEE Commun Mag"},{"issue":"12","key":"769_CR5","doi-asserted-by":"crossref","first-page":"3528","DOI":"10.1109\/TC.2015.2409857","volume":"64","author":"M Qiu","year":"2015","unstructured":"Qiu M, Ming Z, Li J, Gai K, Zong Z (2015) Phase-change memory optimization for green cloud with genetic algorithm. IEEE Trans Comput 64(12):3528\u20133540","journal-title":"IEEE Trans Comput"},{"issue":"2","key":"769_CR6","first-page":"317","volume":"16","author":"Y Ren","year":"2015","unstructured":"Ren Y, Shen J, Wang J, Han J, Lee S (2015) Mutual verifiable provable data auditing in public cloud storage. J Internet Technol 16(2):317\u2013323","journal-title":"J Internet Technol"},{"issue":"4","key":"769_CR7","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MCOM.2011.5741144","volume":"49","author":"G Wu","year":"2011","unstructured":"Wu G, Talwar S, Johnsson K, Himayat N, Johnson K (2011) M2m:from mobile to embedded Internet. IEEE Commun Mag 49(4):36\u201343","journal-title":"IEEE Commun Mag"},{"issue":"2","key":"769_CR8","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1109\/TBC.2015.2419824","volume":"61","author":"Z Pan","year":"2015","unstructured":"Pan Z, Zhang Y, Kwong S (2015) Efficient motion and disparity estimation optimization for low complexity multiview video coding. IEEE Trans Broadcast 61(2):166\u2013176","journal-title":"IEEE Trans Broadcast"},{"issue":"3","key":"769_CR9","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/TIFS.2014.2381872","volume":"10","author":"J Li","year":"2015","unstructured":"Li J, Li X, Yang B, Sun X (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensics Security 10(3):507\u2013518","journal-title":"IEEE Trans Inf Forensics Security"},{"issue":"6","key":"769_CR10","first-page":"929","volume":"15","author":"P Guo","year":"2014","unstructured":"Guo P, Wang J, Li B, Lee S (2014) A variable threshold value authentication architecture for wireless mesh networks. J Internet Technol 15(6):929\u2013936","journal-title":"J Internet Technol"},{"issue":"5","key":"769_CR11","doi-asserted-by":"crossref","first-page":"1339","DOI":"10.1109\/TC.2015.2470247","volume":"65","author":"Y Li","year":"2015","unstructured":"Li Y, Dai W, Ming Z, Qiu M (2015) Privacy protection for preventing data over-collection in smart city. IEEE Trans Comput 65(5):1339\u20131350","journal-title":"IEEE Trans Comput"},{"issue":"10","key":"769_CR12","doi-asserted-by":"crossref","first-page":"3677","DOI":"10.1109\/TIT.2007.904784","volume":"53","author":"AK Sadek","year":"2007","unstructured":"Sadek AK, Liu KJR, Ephremides A (2007) Cognitive multiple access via coopeation: Protocol design and stability analysis. IEEE Trans Inf Theory 53(10):3677\u20133696","journal-title":"IEEE Trans Inf Theory"},{"key":"769_CR13","author":"B Gu","year":"2016","unstructured":"Gu B, Sheng V (2016) A robust regularization path algorithm for v-support vector classification. IEEE Trans Neural Netw Learn Syst. doi: 10.1109\/TNNLS.2016.2527796","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"1","key":"769_CR14","first-page":"171","volume":"16","author":"J Shen","year":"2015","unstructured":"Shen J, Tan H, Wang J, Lee S (2015) A novel routing protocol providing good transmission reliability in underwater sensor networks. J Internet Technol 16(1):171\u2013178","journal-title":"J Internet Technol"},{"issue":"7","key":"769_CR15","doi-asserted-by":"crossref","first-page":"1403","DOI":"10.1109\/TNNLS.2014.2342533","volume":"26","author":"B Gu","year":"2015","unstructured":"Gu B, Sheng V, Tay K, Romano W, Li S (2015) Incremental support vector learning for ordinal regression. IEEE Trans Neural Netw Learn Sysy 26(7):1403\u20131416","journal-title":"IEEE Trans Neural Netw Learn Sysy"},{"key":"769_CR16","author":"B Gu","year":"2016","unstructured":"Gu B, Sun X, Sheng V (2016) Structural minimax probability machine. IEEE Trans Neural Netw Learn Sysy. doi: 10.1109\/TNNLS.2016.2544779","journal-title":"IEEE Trans Neural Netw Learn Sysy"},{"issue":"1","key":"769_CR17","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1007\/s11277-014-1748-5","volume":"78","author":"S Xie","year":"2014","unstructured":"Xie S, Wang Y (2014) Construction of tree network with limited delivery latency in homogeneous wireless sensor networks. Wireless Pers Commun 78(1):231\u2013246","journal-title":"Wireless Pers Commun"},{"key":"769_CR18","unstructured":"Zhou X, Song L, Zhang Y (2013) Physical layer security in wireless communications. CRC Press"},{"issue":"2","key":"769_CR19","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1109\/TPDS.2015.2401003","volume":"27","author":"Z Xia","year":"2015","unstructured":"Xia Z, Wang X, Sun X, Wang Q (2015) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340\u2013352","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"769_CR20","author":"Z Fu","year":"2015","unstructured":"Fu Z, Ren K, Shu J, Sun X, Huang F (2015) Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans Parallel Distrib Syst. doi: 10.1109\/TPDS.2015.2506573","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"1","key":"769_CR21","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1587\/transcom.E98.B.190","volume":"E98-B","author":"Z Fu","year":"2015","unstructured":"Fu Z, Sun X, Liu Q, Zhou L, Shu J (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun E98-B(1):190\u2013200","journal-title":"IEICE Trans Commun"},{"issue":"1","key":"769_CR22","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1109\/TWC.2012.120412.112001","volume":"12","author":"I Stanojev","year":"2013","unstructured":"Stanojev I, Yener A (2013) Improving secrecy rate via spectrum leasing for friendly jamming. IEEE Trans Wireless Commun 12(1):134\u2013145","journal-title":"IEEE Trans Wireless Commun"},{"issue":"11","key":"769_CR23","doi-asserted-by":"crossref","first-page":"2453","DOI":"10.1109\/JSAC.2013.131130","volume":"31","author":"N Zhang","year":"2013","unstructured":"Zhang N, Lu N, Shen XS (2013) Cooperative spectrum access towards secure information transfer for CRNs. IEEE J Select Areas in Comm 31(11):2453\u20132464","journal-title":"IEEE J Select Areas in Comm"},{"issue":"4","key":"769_CR24","doi-asserted-by":"crossref","first-page":"1790","DOI":"10.1109\/TWC.2013.021214.130089","volume":"13","author":"H Jeon","year":"2014","unstructured":"Jeon H, Mclaughlin SW, Kim IM, Ha J (2014) Secure communications with untrusted secondary nodes in cognitive radio networks. IEEE Trans Wireless Commun 13(4):1790\u20131805","journal-title":"IEEE Trans Wireless Commun"},{"key":"769_CR25","doi-asserted-by":"crossref","unstructured":"Gabry F, Schrammar N, Girnyk M, Li N, Thobaben R (2012) Cooperation for secure broadcasting in cognitive radio networks. IEEE ICC:1\u20138","DOI":"10.1109\/ICC.2012.6364834"},{"issue":"7","key":"769_CR26","doi-asserted-by":"crossref","first-page":"3622","DOI":"10.1109\/TWC.2013.062413.122042","volume":"12","author":"AA Nasir","year":"2013","unstructured":"Nasir AA, Zhou XY, Durrani S, Kennedy RA (2013) Relaying protocols for wireless energy harvesting and information processing. IEEE Trans Wireless Commun 12(7):3622\u2013 3636","journal-title":"IEEE Trans Wireless Commun"},{"issue":"4","key":"769_CR27","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MWC.2016.7553022","volume":"23","author":"L Jiang","year":"2016","unstructured":"Jiang L, Tian H, Xing Z, Wang K, Zhang K, Maharjan S, Gjessing S, Zhang Y (2016) Social-aware energy harvesting device to device communications in 5g cellular networks. IEEE Wireless Commun 23 (4):20\u201327","journal-title":"IEEE Wireless Commun"},{"issue":"9","key":"769_CR28","doi-asserted-by":"crossref","first-page":"4788","DOI":"10.1109\/TWC.2013.072613.130323","volume":"12","author":"S Lee","year":"2013","unstructured":"Lee S, Zhang R (2013) K.huang opportunistic wireless energy harvesting in cognitive radio networks. IEEE Trans Wireless Comm 12(9):4788\u20134799","journal-title":"IEEE Trans Wireless Comm"},{"issue":"9","key":"769_CR29","doi-asserted-by":"crossref","first-page":"2290","DOI":"10.1109\/TSP.2014.2310433","volume":"62","author":"G Zheng","year":"2014","unstructured":"Zheng G, Jorswieck HZ, Ottersten B (2014) Information and energy cooperation in cognitive radio networks. IEEE Trans Signal Process 62(9):2290\u20132303","journal-title":"IEEE Trans Signal Process"},{"issue":"7","key":"769_CR30","doi-asserted-by":"crossref","first-page":"3622","DOI":"10.1109\/TWC.2013.062413.122042","volume":"12","author":"AA Nasir","year":"2013","unstructured":"Nasir AA, Zhou XY, Durrani S, Kennedy RA (2013) Relaying protocols for wireless energy harvesting and information processing. IEEE Trans Wireless Commun 12(7):3622\u20133636","journal-title":"IEEE Trans Wireless Commun"},{"issue":"5","key":"769_CR31","doi-asserted-by":"crossref","first-page":"1989","DOI":"10.1109\/TWC.2013.031813.120224","volume":"12","author":"R Zhang","year":"2013","unstructured":"Zhang R, Ho CK (2013) MIMO Broadcasting for simultaneous wireless information and power transfer. IEEE Trans Wireless Comm 12(5):1989\u20132001","journal-title":"IEEE Trans Wireless Comm"},{"key":"769_CR32","unstructured":"Product Datasheet, 11667A Power Splitter, Agilent Technologies"},{"issue":"7","key":"769_CR33","doi-asserted-by":"crossref","first-page":"675","DOI":"10.1016\/j.sse.2009.03.015","volume":"53","author":"RJM Vullers","year":"2009","unstructured":"Vullers RJM, Schaijk RV, Doms I, Hoof CV, Mertens R (2009) Micropower energy harvesting. Solid State Electron 53(7):675\u2013814","journal-title":"Solid State Electron"},{"key":"769_CR34","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1002\/nav.3800090303","volume":"9","author":"A Charnes","year":"1962","unstructured":"Charnes A, Cooper WW (1962) Programming with linear fractional functions. Naval Res Logist Quarter 9:181\u2013186","journal-title":"Naval Res Logist Quarter"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-016-0769-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-016-0769-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-016-0769-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T15:54:59Z","timestamp":1568476499000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-016-0769-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,19]]},"references-count":34,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["769"],"URL":"https:\/\/doi.org\/10.1007\/s11036-016-0769-6","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,10,19]]}}}