{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T09:18:49Z","timestamp":1648891129668},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T00:00:00Z","timestamp":1489708800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1007\/s11277-017-4091-9","type":"journal-article","created":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T16:25:59Z","timestamp":1489767959000},"page":"2285-2298","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Dynamic Spectrum Utilization with Secure Sensing in E-Healthcare System"],"prefix":"10.1007","volume":"95","author":[{"given":"Chuan","family":"Lu","sequence":"first","affiliation":[]},{"given":"Bin","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,17]]},"reference":[{"issue":"2","key":"4091_CR1","first-page":"13","volume":"13","author":"H Lee","year":"2011","unstructured":"Lee, H., Park, K.-J., Ko, Y., & Choi, C.-H. (2011). Wireless LAN with medical-grade QoS for e-healthcare. Journal of Communications and Networks, 13(2), 13\u201318.","journal-title":"Journal of Communications and Networks"},{"issue":"2","key":"4091_CR2","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1049\/iet-com:20060596","volume":"2","author":"O Ferrer-Roca","year":"2008","unstructured":"Ferrer-Roca, O., Marcano, F., & Diaz-Cardama, A. (2008). Quality labels for e-health. IET Communications, 2(2), 202\u2013207.","journal-title":"IET Communications"},{"issue":"4","key":"4091_CR3","doi-asserted-by":"crossref","first-page":"2288","DOI":"10.1109\/TCE.2010.5681102","volume":"56","author":"H Yan","year":"2010","unstructured":"Yan, H., Huo, H., Xu, Y., & Gi dlund, M. (2010). Wireless sensor network based E-health system: Implementation and experimental results. IEEE Transactions on Consumer Electronics, 56(4), 2288\u20132295.","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"5","key":"4091_CR4","doi-asserted-by":"crossref","first-page":"1247","DOI":"10.1109\/TITB.2010.2047507","volume":"14","author":"P Phunchongharn","year":"2010","unstructured":"Phunchongharn, P., Niyato, D., Hossain, E., & Camorlinga, S. (2010). An EMI-aware prioritized wireless access scheme for e-health applications in hospital environments. IEEE Transactions on Information Technology in Biomedicine, 14(5), 1247\u20131258.","journal-title":"IEEE Transactions on Information Technology in Biomedicine"},{"issue":"10","key":"4091_CR5","doi-asserted-by":"crossref","first-page":"2002","DOI":"10.1109\/TMM.2016.2602758","volume":"18","author":"X Yuan","year":"2016","unstructured":"Yuan, X., Wang, X., Wang, C., Weng, J., & Ren, K. (2016). Enabling secure and fast indexing for privacy-assured healthcare monitoring via compressive sensing. IEEE Transactions on Multimedia, 18(10), 2002\u20132014.","journal-title":"IEEE Transactions on Multimedia"},{"issue":"3","key":"4091_CR6","doi-asserted-by":"crossref","first-page":"3293","DOI":"10.1007\/s11042-016-3716-4","volume":"76","author":"Y Yang","year":"2017","unstructured":"Yang, Y., Xu, Z., Liu, L., et al. (2017). A security carving approach for AVI video based on frame size and index. Multimed Tools Appl, 76(3), 3293\u20133312.","journal-title":"Multimed Tools Appl"},{"key":"4091_CR7","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2015.2487364","author":"G Zhou","year":"2016","unstructured":"Zhou, G., Cichocki, A., Zhang, Y., & Mandic, D. (2016). Group component analysis from multi-block data: Common and individual feature extraction. IEEE Transactions on Neural Networks and Learning Systems. doi:\n                        10.1109\/TNNLS.2015.2487364\n                        \n                    .","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"4091_CR8","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2016.2517096","author":"Z Yang","year":"2016","unstructured":"Yang, Z., Xiang, Y., Xie, K., & Lai, Y. (2016). Adaptive method for nonsmooth nonnegative matrix factorization. IEEE Transactions on Neural Networks and Learning Systems. doi:\n                        10.1109\/TNNLS.2016.2517096\n                        \n                    .","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"4091_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2016.11.005","author":"J Ye","year":"2016","unstructured":"Ye, J., Xu, Z., et al. (2016). Secure outsourcing of modular exponentiations under single untrusted programme model. Journal of Computer and System Sciences. doi:\n                        10.1016\/j.jcss.2016.11.005\n                        \n                    .","journal-title":"Journal of Computer and System Sciences"},{"issue":"4","key":"4091_CR10","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1109\/98.788210","volume":"6","author":"J Mitola","year":"1999","unstructured":"Mitola, J., & Maguire, G. Q. (1999). Cognitive radios: Making software radios more personal. IEEE Personal Communications, 6(4), 13\u201318.","journal-title":"IEEE Personal Communications"},{"key":"4091_CR11","doi-asserted-by":"crossref","first-page":"1456","DOI":"10.1109\/TVT.2016.2555084","volume":"66","author":"Y Liu","year":"2017","unstructured":"Liu, Y., Pan, M., Yu, R., Zhang, Y., & Xie, S. (2017). SD-MAC: Spectrum database-driven MAC protocol for cognitive machine-to-machine networks. IEEE Transactions on Vehicular Technology, 66, 1456\u20131467.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"4091_CR12","doi-asserted-by":"crossref","first-page":"358","DOI":"10.1109\/ACCESS.2015.2421517","volume":"3","author":"Y Liu","year":"2015","unstructured":"Liu, Y., Yang, Z., Yu, R., Xiang, Y., & Xie, S. (2015). An efficient MAC protocol with adaptive energy harvesting for machine-to-machine networks. IEEE ACCESS, 3, 358\u2013367.","journal-title":"IEEE ACCESS"},{"key":"4091_CR13","unstructured":"J. Mitola (2000). Cognitive radio: An integrated agent architecture for software defined radio. Ph.D. Thesis, KTH Royal Inst. Technology, Stockholm, Sweden."},{"issue":"2","key":"4091_CR14","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1109\/TNNLS.2015.2411673","volume":"27","author":"R Yu","year":"2016","unstructured":"Yu, R., Zhong, W., Xie, S., & Zhang, Y. (2016). QoS differential scheduling in cognitive-radio-based smart grid networks: An adaptive dynamic programming approach. IEEE Transactions on Neural Networks and Learning Systems, 27(2), 435\u2013443.","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"issue":"4","key":"4091_CR15","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MCOM.2008.4481340","volume":"46","author":"R Chen","year":"2008","unstructured":"Chen, R., Park, J. M., Hou, Y. T., & Reed, J. H. (2008). Toward secure distributed spectrum sensing in cognitive radio networks. IEEE Communications Magazine, 46(4), 50\u201355.","journal-title":"IEEE Communications Magazine"},{"key":"4091_CR16","doi-asserted-by":"crossref","unstructured":"Chen, R., & Park, J. M. (2006). Ensuring trustworthy spectrum sensing in cognitive radio networks. In Proceedings of IEEE workshop networking technologies for software defined radio networks (pp. 110\u2013119), September 2006.","DOI":"10.1109\/SDR.2006.4286333"},{"issue":"1","key":"4091_CR17","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1109\/JSAC.2008.080104","volume":"26","author":"R Chen","year":"2008","unstructured":"Chen, R., Park, J. M., & Reed, J. H. (2008). Defense against primary user emulation attacks in cognitive radio networks. IEEE Journal on Selected Areas in Communications, 26(1), 25\u201337.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"4091_CR18","doi-asserted-by":"crossref","unstructured":"Anand, S., Jin, Z., & Subbalakshmi, K. P. (2008). An analytical model for primary user emulation attacks in cognitive radio networks. In Proceedings of IEEE DYSPAN, 1\u20136 October 2008.","DOI":"10.1109\/DYSPAN.2008.16"},{"key":"4091_CR19","doi-asserted-by":"crossref","unstructured":"Liu, Y., Yu, R., Zhang, Y., & Xie, S.-L. (2010). A group-based cooperative medium access control protocol for cognitive radio networks. In Proceedings of IWQOS, 1\u20139 June 2010.","DOI":"10.1109\/IWQoS.2010.5542764"},{"issue":"8","key":"4091_CR20","doi-asserted-by":"crossref","first-page":"3928","DOI":"10.1109\/TVT.2013.2258952","volume":"62","author":"Y Liu","year":"2013","unstructured":"Liu, Y., Xie, S. L., Yu, R., & Zhang, Y. (2013). An efficient MAC protocol with selective grouping and cooperative sensing in cognitive radio networks. IEEE Transactions on Vehicular Technology, 62(8), 3928\u20133941.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"17","key":"4091_CR21","doi-asserted-by":"crossref","first-page":"2079","DOI":"10.1002\/wcm.2476","volume":"15","author":"Y Liu","year":"2015","unstructured":"Liu, Y., Xie, S. L., Yu, R., & Zhang, Y. (2015). Exploiting temporal and spatial diversities for opportunistic spectrum access in cognitive vehicular networks. Wiley Wireless Communications and Mobile Computing (WCMC), 15(17), 2079\u20132094.","journal-title":"Wiley Wireless Communications and Mobile Computing (WCMC)"},{"issue":"5","key":"4091_CR22","doi-asserted-by":"crossref","first-page":"896","DOI":"10.1109\/TMM.2008.922851","volume":"10","author":"H-P Shiang","year":"2008","unstructured":"Shiang, H.-P., & Schaar, M. (2008). Queuing-based dynamic channel selection for heterogeneous multimedia applications over cognitive radio networks. IEEE Transactions on Multimedia, 10(5), 896\u2013909.","journal-title":"IEEE Transactions on Multimedia"},{"key":"4091_CR23","doi-asserted-by":"crossref","unstructured":"Cabric, D., Mishra, S. M., & Brodersen, R. W. (2004). Implementation issues in spectrum sensing for cognitive radios. In Proceedings of Asilomar conference on signals, systems, and computers.","DOI":"10.1109\/ACSSC.2004.1399240"},{"issue":"3","key":"4091_CR24","doi-asserted-by":"crossref","first-page":"1650","DOI":"10.1109\/TSG.2015.2432571","volume":"7","author":"Y Liu","year":"2016","unstructured":"Liu, Y., Yuen, C., Yu, R., Zhang, Y., & Xie, S. (2016). Queuing-based energy consumption management for heterogeneous residential demands in smart grid. IEEE Transactions on Smart Grid, 7(3), 1650\u20131659.","journal-title":"IEEE Transactions on Smart Grid"},{"issue":"3","key":"4091_CR25","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1109\/MNET.2015.7113229","volume":"29","author":"Y Liu","year":"2015","unstructured":"Liu, Y., Zhang, Y., Yu, R., & Xie, S. (2015). Integrated energy and spectrum harvesting for 5G wireless communications. IEEE Network Magazine, 29(3), 75\u201381.","journal-title":"IEEE Network Magazine"},{"key":"4091_CR26","doi-asserted-by":"crossref","DOI":"10.1109\/9780470546550","volume-title":"The calculus tutoring book: The derivative part I","author":"R Ash","year":"1993","unstructured":"Ash, R., & Ash, C. (1993). The calculus tutoring book: The derivative part I. New York, NY: Wiley."},{"issue":"2","key":"4091_CR27","doi-asserted-by":"crossref","first-page":"310","DOI":"10.1109\/JPROC.2015.2474704","volume":"104","author":"G Zhou","year":"2016","unstructured":"Zhou, G., Zhao, Q., Zhang, Y., Adali, T., Xie, S., et al. (2016). Linked component analysis from matrices to high-order tensors: Applications to biomedical data. Proceedings of the IEEE, 104(2), 310\u2013331.","journal-title":"Proceedings of the IEEE"},{"issue":"2","key":"4091_CR28","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1109\/JSAC.2009.090208","volume":"27","author":"A Vinel","year":"2009","unstructured":"Vinel, A., Ni, Q., Staehle, D., & Turlikov, A. (2009). Capacity analysis of reservation-based random access for broadband wireless access networks. IEEE Journal on Selected Areas in Communications, 27(2), 172\u2013181.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"6","key":"4091_CR29","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1109\/MCOM.2013.6525600","volume":"51","author":"M Hasan","year":"2013","unstructured":"Hasan, M., Hossain, E., & Niyato, D. (2013). Random access for machine-to-machine communication in LTE-advanced networks: Issues and approaches. IEEE Communications Magazine, 51(6), 86\u201393.","journal-title":"IEEE Communications Magazine"},{"key":"4091_CR30","doi-asserted-by":"crossref","first-page":"977","DOI":"10.1016\/j.chb.2014.10.010","volume":"51","author":"K Saleem","year":"2015","unstructured":"Saleem, K., Derhab, A., Almuhtadi, J., & Shahzad, B. (2015). Human-oriented design of secure machine-to-machine communication system for e-Healthcare society. Computers in Human Behavior, 51, 977\u2013985.","journal-title":"Computers in Human Behavior"},{"issue":"5","key":"4091_CR31","doi-asserted-by":"crossref","first-page":"1419","DOI":"10.1109\/JSEN.2012.2236013","volume":"13","author":"S Jung","year":"2013","unstructured":"Jung, S., Myllyla, R., & Chung, W. (2013). Wireless machine-to-machine healthcare solution using android mobile devices in global networks. IEEE Sensors Journal, 13(5), 1419\u20131424.","journal-title":"IEEE Sensors Journal"},{"issue":"5","key":"4091_CR32","doi-asserted-by":"crossref","first-page":"4875","DOI":"10.3390\/s110504875","volume":"11","author":"EE Egbogah","year":"2011","unstructured":"Egbogah, E. E., & Fapojuwo, A. O. (2011). A survey of system architecture requirements for health care-based wireless sensor networks. Sensors, 11(5), 4875\u20134898.","journal-title":"Sensors"},{"issue":"3","key":"4091_CR33","first-page":"101","volume":"13","author":"W Jin","year":"2011","unstructured":"Jin, W., Abid, H., Lee, S., Lei, S., & Feng, X. (2011). A secured health care application architecture for cyber-physical systems. Control Engineering and Applied Informatics, 13(3), 101\u2013108.","journal-title":"Control Engineering and Applied Informatics"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-017-4091-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4091-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4091-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,31]],"date-time":"2017-07-31T09:53:00Z","timestamp":1501494780000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-017-4091-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,17]]},"references-count":33,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,8]]}},"alternative-id":["4091"],"URL":"https:\/\/doi.org\/10.1007\/s11277-017-4091-9","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,3,17]]}}}