{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T19:47:36Z","timestamp":1648756056770},"reference-count":13,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2013,5,1]],"date-time":"2013-05-01T00:00:00Z","timestamp":1367366400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Network"],"published-print":{"date-parts":[[2013,5]]},"DOI":"10.1109\/mnet.2013.6523803","type":"journal-article","created":{"date-parts":[[2013,6,13]],"date-time":"2013-06-13T21:10:03Z","timestamp":1371157803000},"page":"16-21","source":"Crossref","is-referenced-by-count":4,"title":["Enabling fair spectrum sharing: mitigating selfish misbehaviors in spectrum contention"],"prefix":"10.1109","volume":"27","author":[{"given":"Kaigui","family":"Bian","sequence":"first","affiliation":[]},{"given":"Jung-Min","family":"Park","sequence":"additional","affiliation":[]},{"given":"Xiaojiang","family":"Du","sequence":"additional","affiliation":[]},{"given":"Xiaoming","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345955"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209220"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2006.68"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2009.0901.060661"},{"key":"ref4","article-title":"Catch It: Detect Malicious Users in Collaborative Spectrum Sensing","author":"wang","year":"0","journal-title":"Proc IEEE Globecom"},{"key":"ref3","article-title":"Authenticating Primary Userss' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless link Signotures","author":"liu","year":"0","journal-title":"Proc IEEE Symp Security and Privacy"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195818"},{"key":"ref5","article-title":"Using Classification to Protect the Integrity of Spectrum Measurements in White Space Networks","author":"fatemieh","year":"0","journal-title":"Proc NDSS"},{"key":"ref8","year":"0","journal-title":"IEEE 802 22 Working Group"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382313"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1621076.1621079"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4481340"},{"key":"ref9","article-title":"Flipping Coins in Many Pockets (Byzan-tine Agreement On Uniformly Random Values)","author":"broder","year":"0","journal-title":"Proc Symp Foundations of Computer Science"}],"container-title":["IEEE Network"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/65\/6523797\/06523803.pdf?arnumber=6523803","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:18:54Z","timestamp":1642004334000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6523803\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5]]},"references-count":13,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/mnet.2013.6523803","relation":{},"ISSN":["0890-8044"],"issn-type":[{"value":"0890-8044","type":"print"}],"subject":[],"published":{"date-parts":[[2013,5]]}}}