{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:35:05Z","timestamp":1729672505763,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1109\/ncc.2017.8077065","type":"proceedings-article","created":{"date-parts":[[2017,10,25]],"date-time":"2017-10-25T19:51:23Z","timestamp":1508961083000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Secrecy outage of cooperative relay network with and without eavesdropper's direct link"],"prefix":"10.1109","author":[{"given":"Khyati","family":"Chopra","sequence":"first","affiliation":[]},{"given":"Ranjan","family":"Bose","sequence":"additional","affiliation":[]},{"given":"Anupam","family":"Joshi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"518","DOI":"10.1109\/PIMRC.2013.6666191","article-title":"Physical layer security enhancement with generalized selection diversity combining","author":"chen","year":"2013","journal-title":"Proc IEEE 24th Annual International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2012.12.110670"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2012.6214287"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7037295"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2012.2213080"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2423290"},{"journal-title":"Digital Communications","year":"2001","author":"proakis","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2006.261613"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.131011"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2009.0634"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2009.2038412"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2007.070065"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2011.2159598"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2011.030911.102343"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2296991"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1561\/0100000036","article-title":"Information theoretic security","volume":"5","author":"liang","year":"2009","journal-title":"Foundations and Trends in Communications and Information Theory"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.928990"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2010.5501963"}],"event":{"name":"2017 Twenty-third National Conference on Communications (NCC)","start":{"date-parts":[[2017,3,2]]},"location":"Chennai, India","end":{"date-parts":[[2017,3,4]]}},"container-title":["2017 Twenty-third National Conference on Communications (NCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8055074\/8077030\/08077065.pdf?arnumber=8077065","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T04:46:39Z","timestamp":1570250799000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8077065\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/ncc.2017.8077065","relation":{},"subject":[],"published":{"date-parts":[[2017,3]]}}}