{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T13:08:23Z","timestamp":1761743303068},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1109\/wiopt.2009.5291619","type":"proceedings-article","created":{"date-parts":[[2009,12,18]],"date-time":"2009-12-18T18:16:59Z","timestamp":1261160219000},"page":"1-8","source":"Crossref","is-referenced-by-count":33,"title":["Physical layer security: Coalitional games for distributed cooperation"],"prefix":"10.1109","author":[{"given":"W.","family":"Saad","sequence":"first","affiliation":[]},{"family":"Zhu Han","sequence":"additional","affiliation":[]},{"given":"T.","family":"Basar","sequence":"additional","affiliation":[]},{"given":"M.","family":"Debbah","sequence":"additional","affiliation":[]},{"given":"A.","family":"Hjorungnes","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"A generic approach to coalition formation (extended version)","year":"2007","author":"apt","key":"19"},{"article-title":"Stable partitions in coalitional games","year":"2006","author":"apt","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1142\/S0219198909002352"},{"journal-title":"Game Theory Analysis of Conflict","year":"1991","author":"myerson","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199207954.001.0001"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2003.810346"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2008.65"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2007.4298439"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2004.1365306"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"2","article-title":"Measurement-based self organization of interfering 802.11 wireless access networks","author":"kauffmann","year":"2007","journal-title":"Proc IEEE Conf on Computer Communications (INFOCOM)"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ATC.2008.4760505"},{"key":"10","article-title":"Secure wireless communications via cooperation","author":"dong","year":"2008","journal-title":"Proc Allerton Conference on Communication Control and Computing"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.928990"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921678"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055892"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055917"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2005.1523727"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.915978"}],"event":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks - WiOpt 2009","start":{"date-parts":[[2009,6,23]]},"location":"Seoul","end":{"date-parts":[[2009,6,27]]}},"container-title":["2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5286911\/5291544\/05291619.pdf?arnumber=5291619","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T22:34:49Z","timestamp":1489876489000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5291619\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/wiopt.2009.5291619","relation":{},"subject":[],"published":{"date-parts":[[2009,6]]}}}