{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:15:08Z","timestamp":1761401708618},"reference-count":32,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2015,10,1]],"date-time":"2015-10-01T00:00:00Z","timestamp":1443657600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"Marie Curie International Research Staff Exchange Scheme Fellowship","award":["PIRSES-GA-2010-269132"],"award-info":[{"award-number":["PIRSES-GA-2010-269132"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Networking"],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/tnet.2014.2331077","type":"journal-article","created":{"date-parts":[[2014,6,26]],"date-time":"2014-06-26T18:36:48Z","timestamp":1403807808000},"page":"1457-1470","source":"Crossref","is-referenced-by-count":4,"title":["Confidentiality-Preserving Control of Uplink Cellular Wireless Networks Using Hybrid ARQ"],"prefix":"10.1109","volume":"23","author":[{"given":"Yunus","family":"Sarikaya","sequence":"first","affiliation":[]},{"given":"Ozgur","family":"Ercetin","sequence":"additional","affiliation":[]},{"given":"Can Emre","family":"Koksal","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2006.875032"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2006.261800"},{"key":"ref30","author":"bertsekas","year":"1989","journal-title":"Parallel and Distributed Computation Numerical Methods"},{"key":"ref10","first-page":"1179","article-title":"LDPC based secret key agreement over Gaussian wiretap channel","author":"bloch","year":"2011","journal-title":"Proc IEEE Int Symp Inf Theory"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2184692"},{"key":"ref12","first-page":"323","article-title":"Secure network coding","author":"cai","year":"2002","journal-title":"Proc IEEE Int Symp Inf Theory"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2013043"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.121017"},{"key":"ref16","first-page":"425","article-title":"Energy efficient routing with mutual information accumulation","author":"girici","year":"2012","journal-title":"Proc 3rd Int Symp Modeling and Optimization in Mobile Ad Hoc Wireless Netw"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2005.858025"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2008.060106"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2004.843012"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2006.879350"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462158"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1561\/1300000001"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921678"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2025549"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2048445"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2010.2092774"},{"key":"ref7","first-page":"4033","article-title":"Improving wireless physical layer security via cooperating relays","volume":"58","author":"dong","year":"2010","journal-title":"IEEE Trans Signal Process"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.928990"},{"key":"ref9","first-page":"337","article-title":"Secure nested codes for type II wiretap channels","author":"liu","year":"2011","journal-title":"Proc IEEE Inf Theory Workshop"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.862414"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2197410"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566891"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.1984.1091865"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2012.6283032"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055892"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195462"}],"container-title":["IEEE\/ACM Transactions on Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/90\/7297875\/06844902.pdf?arnumber=6844902","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:28:02Z","timestamp":1642004882000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6844902\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":32,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tnet.2014.2331077","relation":{},"ISSN":["1063-6692","1558-2566"],"issn-type":[{"value":"1063-6692","type":"print"},{"value":"1558-2566","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,10]]}}}