{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,8,31]],"date-time":"2023-08-31T08:50:25Z","timestamp":1693471825135},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,8,18]],"date-time":"2014-08-18T00:00:00Z","timestamp":1408320000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1186\/1687-1499-2014-134","type":"journal-article","created":{"date-parts":[[2014,8,18]],"date-time":"2014-08-18T07:02:39Z","timestamp":1408345359000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Spectrum sharing with secure transmission"],"prefix":"10.1186","volume":"2014","author":[{"given":"Ngoc Son","family":"Pham","sequence":"first","affiliation":[]},{"given":"Hyung Yun","family":"Kong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,18]]},"reference":[{"issue":"4","key":"960_CR1","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/98.788210","volume":"6","author":"J Mitola","year":"1999","unstructured":"Mitola J, Maguire GQ: Cognitive radio: making software radios more personal. IEEE Pers. Commun 1999, 6(4):13-18. 10.1109\/98.788210","journal-title":"IEEE Pers. Commun"},{"key":"960_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-1499-2013-265","volume":"2013","author":"M-D Weng","year":"2013","unstructured":"Weng M-D, Lee B-H, Chen J-M: Two novel price-based algorithms for spectrum sharing in cognitive radio networks. EURASIP J. Wireless Commun. Netw 2013, 2013: 1-16. 10.1186\/1687-1499-2013-1","journal-title":"EURASIP J. Wireless Commun. Netw"},{"key":"960_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-1499-2012-28","volume":"2012","author":"L Lu","year":"2012","unstructured":"Lu L, Zhou X, Onunkwo U, Li GY: Ten years of research in spectrum sensing and sharing in cognitive radio. EURASIP J. Wireless Commun. Netw 2012, 2012: 1-16. 10.1186\/1687-1499-2012-1","journal-title":"EURASIP J. Wireless Commun. Netw"},{"issue":"2","key":"960_CR4","doi-asserted-by":"publisher","first-page":"857","DOI":"10.1007\/s11277-012-0616-4","volume":"69","author":"TT Duy","year":"2013","unstructured":"Duy TT, Kong H-Y: Performance analysis of two-way hybrid decode-and-amplify relaying scheme with relay selection for secondary spectrum access. Wireless Pers. Commun 2013, 69(2):857-878. 10.1007\/s11277-012-0616-4","journal-title":"Wireless Pers. Commun"},{"issue":"10","key":"960_CR5","doi-asserted-by":"publisher","first-page":"4945","DOI":"10.1109\/TWC.2009.081484","volume":"8","author":"Y Han","year":"2009","unstructured":"Han Y, Pandharipande A, Ting SH: Cooperative decode-and-forward relaying for secondary spectrum access. IEEE Trans. Wireless Commun 2009, 8(10):4945-4950.","journal-title":"IEEE Trans. Wireless Commun"},{"issue":"8","key":"960_CR6","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"AD Wyner","year":"1975","unstructured":"AD Wyner: The wire-tap channel. Bell Syst. Tech. J 1975, 54(8):1355-1367. 10.1002\/j.1538-7305.1975.tb02040.x","journal-title":"Bell Syst. Tech. J"},{"issue":"4","key":"960_CR7","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1109\/TIT.1978.1055917","volume":"24","author":"S Leung-Yan-Cheong","year":"1978","unstructured":"Leung-Yan-Cheong S, Hellman ME: The Gaussian wire-tap channel. IEEE Trans. Inform. Theory 1978, 24(4):451-456. 10.1109\/TIT.1978.1055917","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"3","key":"960_CR8","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1109\/TIT.1978.1055892","volume":"24","author":"I Csiszar","year":"1978","unstructured":"Csiszar I, Korner J: Broadcast channels with confidential messages. IEEE Trans. Inform. Theory 1978, 24(3):339-348. 10.1109\/TIT.1978.1055892","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"6","key":"960_CR9","doi-asserted-by":"publisher","first-page":"2470","DOI":"10.1109\/TIT.2008.921678","volume":"54","author":"Y Liang","year":"2008","unstructured":"Liang Y, Poor HV, Shamai S: Secure communication over fading channels. IEEE Trans. Inform. Theory 2008, 54(6):2470-2492.","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"9","key":"960_CR10","doi-asserted-by":"publisher","first-page":"4005","DOI":"10.1109\/TIT.2008.928272","volume":"54","author":"L Lai","year":"2008","unstructured":"Lai L, Gamal HE: The relay-eavesdropper channel: cooperation for secrecy. IEEE Trans. Inform. Theory 2008, 54(9):4005-4019.","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"2","key":"960_CR11","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1109\/TIFS.2012.2185493","volume":"7","author":"ZH Awan","year":"2012","unstructured":"Awan ZH, Zaidi A, Vandendorpe L: Secure communication over parallel relay channel. IEEE Trans. Inform. Forensics Secur 2012, 7(2):359-371.","journal-title":"IEEE Trans. Inform. Forensics Secur"},{"key":"960_CR12","doi-asserted-by":"publisher","first-page":"982","DOI":"10.1109\/Allerton.2012.6483325","volume-title":"50th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","author":"ZH Awan","year":"2012","unstructured":"Awan ZH, Zaidi A, Vandendorpe L: On multiaccess channel with unidirectional cooperation and security constraints. In 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton). Monticello; 1\u20135 Oct 2012:982-987."},{"issue":"7","key":"960_CR13","doi-asserted-by":"publisher","first-page":"1243","DOI":"10.1109\/TIFS.2013.2263804","volume":"8","author":"ZH Awan","year":"2013","unstructured":"Awan ZH, Zaidi A, Vandendorpe L: Multiaccess channel with partially cooperating encoders and security constraints. IEEE Trans. Inform. Forensics Secur 2013, 8(7):1243-1254.","journal-title":"IEEE Trans. Inform. Forensics Secur"},{"issue":"12","key":"960_CR14","doi-asserted-by":"publisher","first-page":"5747","DOI":"10.1109\/TIT.2008.2006422","volume":"54","author":"E Tekin","year":"2008","unstructured":"Tekin E, Yener A: The Gaussian multiple access wire-tap channel. IEEE Trans. Inform. Theory 2008, 54(12):5747-5755.","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"6","key":"960_CR15","doi-asserted-by":"publisher","first-page":"2735","DOI":"10.1109\/TIT.2008.921680","volume":"54","author":"E Tekin","year":"2008","unstructured":"Tekin E, Yener A: The general Gaussian multiple access and two-way wire-tap channels achievable rates and cooperative jamming. IEEE Trans. Inform. Theory 2008, 54(6):2735-2751.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"960_CR16","first-page":"1","volume":"2010","author":"Z Han","year":"2010","unstructured":"Han Z, Marina N, Debbah M, Hj\u00f8rungnes A: Physical layer security game: interaction between source, eavesdropper, and friendly jammer. EURASIP J. Wireless Commun. Netw 2010, 2010: 1-10.","journal-title":"EURASIP J. Wireless Commun. Netw"},{"issue":"3","key":"960_CR17","doi-asserted-by":"publisher","first-page":"1875","DOI":"10.1109\/TSP.2009.2038412","volume":"58","author":"L Dong","year":"2010","unstructured":"Dong L, Han Z, Petropulu A, Poor H: Improving wireless physical layer security via cooperating relays. IEEE Trans. Signal Process 2010, 58(3):1875-1888.","journal-title":"IEEE Trans. Signal Process"},{"issue":"16","key":"960_CR18","doi-asserted-by":"publisher","first-page":"2676","DOI":"10.1049\/iet-com.2011.0638","volume":"6","author":"H Sakran","year":"2012","unstructured":"Sakran H, Nasr O, Shokair M, El-Rabaie S, El-Azm AA: Proposed relay selection scheme for physical layer security in cognitive radio networks. IET Communications 2012, 6(16):2676-2687. 10.1049\/iet-com.2011.0638","journal-title":"IET Communications"},{"issue":"7","key":"960_CR19","doi-asserted-by":"publisher","first-page":"3532","DOI":"10.1109\/TSP.2012.2191543","volume":"60","author":"H-M Wang","year":"2012","unstructured":"Wang H-M, Yin Q, Xia X-G: Distributed beamforming for physical-layer security of two-way relay networks. IEEE Trans. Signal Process 2012, 60(7):3532-3545.","journal-title":"IEEE Trans. Signal Process"},{"issue":"4","key":"960_CR20","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1109\/JCN.2012.6292243","volume":"14","author":"J Kim","year":"2012","unstructured":"Kim J, Ikhlef A, Schober R: Combined relay selection and cooperative beamforming for physical layer security. J. Commun. Netw 2012, 14(4):364-373.","journal-title":"J. Commun. Netw"},{"issue":"6","key":"960_CR21","doi-asserted-by":"publisher","first-page":"2842","DOI":"10.1109\/TVT.2012.2197032","volume":"61","author":"Z Ding","year":"2012","unstructured":"Ding Z, Xu M, Lu J, Liu F: Improving wireless security for bidirectional communication scenarios. IEEE Trans. Vehicular Technol 2012, 61(6):2842-2848.","journal-title":"IEEE Trans. Vehicular Technol"},{"issue":"10","key":"960_CR22","doi-asserted-by":"publisher","first-page":"5003","DOI":"10.1109\/TWC.2009.090323","volume":"8","author":"I Krikidis","year":"2009","unstructured":"Krikidis I, Thompson JS, McLaughlin S: Relay selection for secure cooperative networks with jamming. IEEE Trans. Wireless Commun 2009, 8(10):5003-5011.","journal-title":"IEEE Trans. Wireless Commun"},{"key":"960_CR23","first-page":"1","volume-title":"Global Telecommunications Conference (GLOBECOM 2011)","author":"J Chen","year":"5","unstructured":"Chen J, Song L, Han Z, Jiao B: Joint relay and jammer selection for secure decode-and-forward two-way relay communications. In Global Telecommunications Conference (GLOBECOM 2011). Houston; 5:1-5."},{"issue":"1","key":"960_CR24","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1109\/TWC.2012.120412.112001","volume":"12","author":"I Stanojev","year":"2013","unstructured":"Stanojev I, Yener A: Improving secrecy rate via spectrum leasing for friendly jamming. IEEE Trans. Wireless Commun 2013, 12(1):134-145.","journal-title":"IEEE Trans. Wireless Commun"},{"issue":"8","key":"960_CR25","first-page":"3801","volume":"56","author":"X He","year":"2010","unstructured":"He X, Yener A: Cooperation with an untrusted relay: a secrecy perspective. IEEE Trans. Inform. Theory 2010, 56(8):3801-3827.","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"4","key":"960_CR26","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/MWC.2006.1678169","volume":"13","author":"L Pei","year":"2006","unstructured":"Pei L, Zhifeng T, Zinan L, Erkip E, Panwar S: Cooperative wireless communications: a cross-layer approach. IEEE Wireless Commun 2006, 13(4):84-92. 10.1109\/MWC.2006.1678169","journal-title":"IEEE Wireless Commun"},{"key":"960_CR27","first-page":"68","volume-title":"49th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","author":"ML Treust","year":"28","unstructured":"Treust ML, Zaidi A, Lasaulce S: An achievable rate region for the broadcast wiretap channel with asymmetric side information. In 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton). Monticello; 28:68-75."},{"issue":"6","key":"960_CR28","doi-asserted-by":"publisher","first-page":"2221","DOI":"10.1109\/TCOMM.2013.032713.120719","volume":"61","author":"Y Liang","year":"2013","unstructured":"Liang Y, Qaraqe K, Serpedin E, Alouini M: Performance analysis of amplify-and-forward two-way relaying with co-channel interference and channel estimation error. IEEE Trans. Commun 2013, 61(6):2221-2231.","journal-title":"IEEE Trans. Commun"},{"issue":"3","key":"960_CR29","doi-asserted-by":"publisher","first-page":"796","DOI":"10.1109\/78.661350","volume":"46","author":"HL Li","year":"1998","unstructured":"Li HL, Djurie PM: MMSE estimation of nonlinear parameters of multiple linear\/quadratic chirps. IEEE Trans. Signal Process 1998, 46(3):796-800. 10.1109\/78.661350","journal-title":"IEEE Trans. Signal Process"},{"issue":"5","key":"960_CR30","doi-asserted-by":"publisher","first-page":"1206","DOI":"10.1109\/TASL.2010.2087753","volume":"19","author":"JA Gonzalez","year":"2011","unstructured":"Gonzalez JA, Peinado AM, Gomez AM, Carmona JL: Efficient MMSE estimation and uncertainty processing for multienvironment robust speech recognition. IEEE Trans. Audio Speech Lang. Process 2011, 19(5):1206-1220.","journal-title":"IEEE Trans. Audio Speech Lang. Process"},{"key":"960_CR31","volume-title":"Table of Integral, Series and Products","author":"IS Gradshteyn","year":"2007","unstructured":"Gradshteyn IS, Ryzhik IM, Jeffrey A, Zwillinger D: Table of Integral, Series and Products. Elsevier, Amsterdam; 2007."},{"issue":"6","key":"960_CR32","doi-asserted-by":"publisher","first-page":"2515","DOI":"10.1109\/TIT.2008.921908","volume":"54","author":"M Bloch","year":"2008","unstructured":"Bloch M, Barros J, Rodrigues M, McLaughlin S: Wireless information-theoretic security. IEEE Trans. Inform. Theory 2008, 54(6):2515-2534.","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"2","key":"960_CR33","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1109\/TIFS.2013.2296991","volume":"9","author":"L Wang","year":"2014","unstructured":"Wang L, Yang N, Elkashlan M, Yeoh PL, Yuan J: Physical layer security of maximal ratio combining in two-wave with diffuse power fading channels. IEEE Trans. Inform. Forensics Secur 2014, 9(2):247-258.","journal-title":"IEEE Trans. Inform. Forensics Secur"},{"issue":"8","key":"960_CR34","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1109\/LSP.2012.2203302","volume":"19","author":"X Sun","year":"2012","unstructured":"Sun X, Wang J, Xu W, Zhao C: Performance of secure communications over correlated fading channels. IEEE Signal Process. Lett 2012, 19(8):479-482.","journal-title":"IEEE Signal Process. Lett"},{"issue":"10","key":"960_CR35","doi-asserted-by":"publisher","first-page":"3418","DOI":"10.1109\/TWC.2012.083112.111074","volume":"11","author":"A Nasri","year":"2012","unstructured":"Nasri A, Schober R, Uysal M: Enhanced MRC for decode-and-forward cooperative diversity systems. IEEE Trans. Wireless Commun 2012, 11(10):3418-3423.","journal-title":"IEEE Trans. Wireless Commun"},{"key":"960_CR36","volume-title":"Probability, Random Variables and Stochastic Processes","author":"A Papoulis","year":"2002","unstructured":"Papoulis A, Pillai SU: Probability, Random Variables and Stochastic Processes. McGraw-Hill, New York; 2002."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-1499-2014-134\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2014-134.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2014-134.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,21]],"date-time":"2019-01-21T21:28:46Z","timestamp":1548106126000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-1499-2014-134"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8,18]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["960"],"URL":"https:\/\/doi.org\/10.1186\/1687-1499-2014-134","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,8,18]]},"assertion":[{"value":"16 December 2013","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 August 2014","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 August 2014","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"134"}}