{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,19]],"date-time":"2024-08-19T13:13:39Z","timestamp":1724073219225},"reference-count":12,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1109\/iwcit.2019.8731631","type":"proceedings-article","created":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T23:22:13Z","timestamp":1559863333000},"source":"Crossref","is-referenced-by-count":10,"title":["Outage Performance in Secure Cooperative NOMA"],"prefix":"10.1109","author":[{"given":"Milad","family":"Abolpour","sequence":"first","affiliation":[]},{"given":"Mahtab","family":"Mirmohseni","sequence":"additional","affiliation":[]},{"given":"Mohammad Reza","family":"Aref","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2650987"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2015.2441064"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511807213"},{"key":"ref6","first-page":"1","article-title":"Physical-layer security of noma systems under untrusted users","author":"eihalawany","year":"2018","journal-title":"2018 IEEE Global Communications Conference (GLOBECOM)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IWCIT.2019.8731631"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2737330"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.02.005"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2824624"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2789223"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2014.2343971"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647883"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2621116"}],"event":{"name":"2019 Iran Workshop on Communication and Information Theory (IWCIT)","location":"Tehran, Iran","start":{"date-parts":[[2019,4,24]]},"end":{"date-parts":[[2019,4,25]]}},"container-title":["2019 Iran Workshop on Communication and Information Theory (IWCIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8726000\/8731615\/08731631.pdf?arnumber=8731631","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T21:54:05Z","timestamp":1658094845000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8731631\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/iwcit.2019.8731631","relation":{},"subject":[],"published":{"date-parts":[[2019,4]]}}}