{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:20:48Z","timestamp":1729628448062,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/glocomw.2016.7848961","type":"proceedings-article","created":{"date-parts":[[2017,2,9]],"date-time":"2017-02-09T16:41:58Z","timestamp":1486658518000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["MIMO Relay-Assisted Secure Uplink with Compute and Forward and Full-Duplex Devices"],"prefix":"10.1109","author":[{"given":"Stefano","family":"Tomasin","sequence":"first","affiliation":[]}],"member":"263","reference":[{"article-title":"Secure transmission on the two-hop relay channel with scaled compute-and-forward","year":"0","author":"zhijie","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.834787"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2016.7794560"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2006.890913"},{"key":"ref14","article-title":"Asymmetric compute-and-forward with CSIT","author":"zhu","year":"2014","journal-title":"Proc Int Zurich Seminar on Commun"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2011.2161295"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.185"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2014.2364786"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2166386"},{"key":"ref8","article-title":"Exploiting direct links for physical layer security in multi-user multirelay networks","author":"fan","year":"0","journal-title":"IEEE Trans Wireless Commun"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2390136"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7105651"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MCOM.2015.7081071","article-title":"Safeguarding 5G wireless communication networks using physical layer security","volume":"53","author":"nan","year":"2015","journal-title":"IEEE Commun Mag"},{"article-title":"Near-optimal modulo-and-forward scheme for the untrusted relay channel","year":"0","author":"shengli","key":"ref9"}],"event":{"name":"2016 IEEE Globecom Workshops (GC Wkshps)","start":{"date-parts":[[2016,12,4]]},"location":"Washington, DC, USA","end":{"date-parts":[[2016,12,8]]}},"container-title":["2016 IEEE Globecom Workshops (GC Wkshps)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7840534\/7848793\/07848961.pdf?arnumber=7848961","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T06:13:05Z","timestamp":1498371185000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7848961\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/glocomw.2016.7848961","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}