{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:47:50Z","timestamp":1771699670620,"version":"3.50.1"},"reference-count":27,"publisher":"Zhejiang University Press","issue":"6","license":[{"start":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T00:00:00Z","timestamp":1496275200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Frontiers Inf Technol Electronic Eng"],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1631\/fitee.1700023","type":"journal-article","created":{"date-parts":[[2017,6,29]],"date-time":"2017-06-29T07:01:48Z","timestamp":1498719708000},"page":"796-807","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Correlated channel model-based secure communications in dual-hop wireless communication networks"],"prefix":"10.1631","volume":"18","author":[{"given":"Zhen-hua","family":"Yuan","sequence":"first","affiliation":[]},{"given":"Chen","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xiang","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Guo-cheng","family":"Lv","sequence":"additional","affiliation":[]},{"given":"Liu-qing","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Ye","family":"Jin","sequence":"additional","affiliation":[]}],"member":"635","published-online":{"date-parts":[[2017,6,30]]},"reference":[{"key":"ref1","article-title":"Signal Detection and Estimation","author":"Barkat","year":"2005","journal-title":"Artech House"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/milcom.2011.6127796"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2012.120218"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2015.2482494"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/tit.1978.1055892"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/tsp.2009.2038412"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/wcl.2013.112313.130733"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/lcomm.2013.050313.130353"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ncc.2013.6487960"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/iscit.2009.5341231"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2007.070919"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2009.0634"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-2580-2"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/tit.1978.1055917"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/tsp.2011.2159598"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/msp.2010.936019"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.2307\/2531754"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2005.853325"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2005.850094"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2012.2230657"},{"issue":"12","key":"ref21","doi-asserted-by":"crossref","first-page":"951","DOI":"10.1049\/el.2014.4401","article-title":"Relay selection for secure backscatter wireless communications","volume":"51","author":"Wang","year":"2015","journal-title":"Electron. Lett."},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1002\/9781118188248"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/glocom.2016.7842252"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2016.2583423"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/glocom.2015.7417724"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2016.7511531"}],"container-title":["Frontiers of Information Technology &amp; Electronic Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1631\/FITEE.1700023\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.1700023.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.1700023.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T06:55:24Z","timestamp":1771656924000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1631\/FITEE.1700023"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":27,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2017,6]]}},"alternative-id":["1097"],"URL":"https:\/\/doi.org\/10.1631\/fitee.1700023","relation":{},"ISSN":["2095-9184","2095-9230"],"issn-type":[{"value":"2095-9184","type":"print"},{"value":"2095-9230","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,6]]}}}