{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T19:41:23Z","timestamp":1730230883977,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,9]],"date-time":"2023-11-09T00:00:00Z","timestamp":1699488000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,9]],"date-time":"2023-11-09T00:00:00Z","timestamp":1699488000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,9]]},"DOI":"10.1109\/icast57874.2023.10359261","type":"proceedings-article","created":{"date-parts":[[2023,12,21]],"date-time":"2023-12-21T14:23:24Z","timestamp":1703168604000},"page":"96-99","source":"Crossref","is-referenced-by-count":0,"title":["Secrecy Rate Analysis for the Cooperative Communications"],"prefix":"10.1109","author":[{"given":"Jong-Shin","family":"Chen","sequence":"first","affiliation":[{"name":"Chaoyang Uni. of Tech,Dept. of Info. and Comm. Eng.,Taichung,Taiwan, R.O.C."}]},{"given":"Cheng-Ying","family":"Yang","sequence":"additional","affiliation":[{"name":"University of Taipei,Department of Computer Science,Taipei,Taiwan, R.O.C."}]},{"given":"Jenq-Foung JF","family":"Yao","sequence":"additional","affiliation":[{"name":"Georgia College and State University,Dept of Computer Science,Milledgeville,USA"}]},{"given":"Min-Shiang","family":"Hwang","sequence":"additional","affiliation":[{"name":"Asia University,Dept. of C.S. and Info. Eng.,Taichung,Taiwan, R.O.C."}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.101810.100311"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.120211"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.04.080175"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.070176"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.2015.7018202"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2011.101411.100677"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.38"},{"issue":"3","key":"ref8","first-page":"1","article-title":"Relay Selection Strategy in the Secure Cooperative Communication System","volume":"15","author":"Liang","year":"2017","journal-title":"Journal of Electric Science and Technology"},{"issue":"6","key":"ref9","first-page":"863","article-title":"The Capacity Analysis in the Secure Cooperative Communication System","volume":"19","author":"Chen","year":"2017","journal-title":"International Journal of Network Security"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2011.5751298"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1056-0_30"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2009.2038412"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.131011"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7018202"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2014.012314.00178"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2296991"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2433291"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2296991"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1984.tb00072.x"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"issue":"2","key":"ref22","first-page":"63","article-title":"Low-density Parity-Check (LDPC) Code Aided Equalizer","volume":"2","author":"Yang","year":"2008","journal-title":"International Journal of Advanced Information Technology"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1103\/physreva.69.052319"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1017\/cbo9780511977985"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/isit.2006.261613"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CIG.2010.5592770"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2148715"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2145371"},{"key":"ref29","article-title":"A Study of Secrecy Codes and Their Real-World Performance","volume-title":"Master Thesis","author":"Nair","year":"2017"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2015.060939"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.29007\/gdqz"},{"key":"ref32","first-page":"86","article-title":"Greedy Algorithm Applied Secrecy Rate Analysis in the Cooperative Communication","volume-title":"Proceedings of the 2019 International Conference on Information and Knowledge Engineering","author":"Chen"}],"event":{"name":"2023 12th International Conference on Awareness Science and Technology (iCAST)","start":{"date-parts":[[2023,11,9]]},"location":"Taichung, Taiwan","end":{"date-parts":[[2023,11,11]]}},"container-title":["2023 12th International Conference on Awareness Science and Technology (iCAST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10359246\/10359247\/10359261.pdf?arnumber=10359261","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T16:41:14Z","timestamp":1705077674000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10359261\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,9]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/icast57874.2023.10359261","relation":{},"subject":[],"published":{"date-parts":[[2023,11,9]]}}}