{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T13:21:37Z","timestamp":1761744097909},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/glocomw.2014.7063626","type":"proceedings-article","created":{"date-parts":[[2015,3,20]],"date-time":"2015-03-20T17:21:39Z","timestamp":1426872099000},"page":"1379-1384","source":"Crossref","is-referenced-by-count":5,"title":["Cooperation for secure wireless communications with resource-bounded eavesdroppers"],"prefix":"10.1109","author":[{"given":"Nicholas","family":"Kolokotronis","sequence":"first","affiliation":[]},{"given":"Kyriakos","family":"Fytrakis","sequence":"additional","affiliation":[]},{"given":"Alexandras","family":"Katsiotis","sequence":"additional","affiliation":[]},{"given":"Nicholas","family":"Kalouptsidis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2013.6666189"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2134093"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1145\/2627393.2627413","article-title":"Attacking and defending lightweight PHY security schemes for wireless communications","author":"kolokotronis","year":"2014","journal-title":"Proc ACM WiSec '14"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055917"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2007.4298439"},{"article-title":"Information Theoretic Security","year":"2009","author":"liang","key":"ref15"},{"article-title":"Error Control Coding","year":"2004","author":"lin","key":"ref16"},{"article-title":"Securing Wireless Communications at the Physical Laver","year":"2010","author":"liu","key":"ref17"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-0939-3","article-title":"Theory of Complex Functions","author":"remmert","year":"1991"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2007.4557589"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/792538.792543"},{"key":"ref6","first-page":"1132","article-title":"Secure wireless communications via cooperation","author":"dong","year":"2008","journal-title":"46th Annual Allerton Conference"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055892"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2009.2038412"},{"key":"ref7","first-page":"417","article-title":"Cooperative jamming for wireless physical layer security","author":"dong","year":"2009","journal-title":"IEEE SSP'09"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511977985"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921908"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.56021\/9781421407944","article-title":"Matrix Computations","author":"golub","year":"2013"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2011.6162575"},{"article-title":"Physical Layer Security in Wireless Communications","year":"2014","author":"zhou","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"}],"event":{"name":"2014 IEEE Globecom Workshops (GC Wkshps)","start":{"date-parts":[[2014,12,8]]},"location":"Austin, TX, USA","end":{"date-parts":[[2014,12,12]]}},"container-title":["2014 IEEE Globecom Workshops (GC Wkshps)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7050532\/7063320\/07063626.pdf?arnumber=7063626","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,8]],"date-time":"2023-08-08T22:39:32Z","timestamp":1691534372000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7063626\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/glocomw.2014.7063626","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}