{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T12:38:48Z","timestamp":1766579928711,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/istel.2018.8661020","type":"proceedings-article","created":{"date-parts":[[2019,3,7]],"date-time":"2019-03-07T18:58:46Z","timestamp":1551985126000},"page":"670-675","source":"Crossref","is-referenced-by-count":13,"title":["Secure Transmission with Covert Requirement in Untrusted Relaying Networks"],"prefix":"10.1109","author":[{"given":"Moslem","family":"Forouzesh","sequence":"first","affiliation":[]},{"given":"Paeiz","family":"Azmi","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Kuhestani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/TWC.2018.2822286"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/ACCESS.2018.2818110"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/LCOMM.2016.2647716"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/TWC.2017.2720736"},{"year":"0","author":"forouzesh","article-title":"Covert Communications Versus Physical Layer Security","key":"ref14"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/TWC.2018.2831217"},{"year":"1996","author":"browder","journal-title":"Mathematical Analysis An Introduction","key":"ref16"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/JIOT.2017.2691352"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/TIT.2010.2068852"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/TIT.2010.2048445"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/ISTEL.2016.7881822"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/TVT.2014.2370754"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/GLOCOM.2008.ECP.185"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/TVT.2013.2238687"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/SURV.2014.012314.00178"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"ref9","first-page":"341","article-title":"Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems With Untrusted Relays and Passive Eavesdroppers","volume":"13","author":"kuhestani","year":"2018","journal-title":"IEEE Trans Inf Foren and Secur"}],"event":{"name":"2018 9th International Symposium on Telecommunications (IST)","start":{"date-parts":[[2018,12,17]]},"location":"Tehran, Iran","end":{"date-parts":[[2018,12,19]]}},"container-title":["2018 9th International Symposium on Telecommunications (IST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8653247\/8660802\/08661020.pdf?arnumber=8661020","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T00:59:51Z","timestamp":1643245191000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8661020\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/istel.2018.8661020","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}