{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T03:09:21Z","timestamp":1730344161078,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.23919\/isita.2018.8664383","type":"proceedings-article","created":{"date-parts":[[2019,3,11]],"date-time":"2019-03-11T23:49:11Z","timestamp":1552348151000},"page":"668-672","source":"Crossref","is-referenced-by-count":3,"title":["Secrecy Performance on Half-Duplex Two-Way Multi-Relay Transmission Technique Under Wireless Physical Layer Security"],"prefix":"10.23919","author":[{"given":"Mohammed Ahmed","family":"Salem","sequence":"first","affiliation":[]},{"given":"Azlan Bin","family":"Abd. Aziz","sequence":"additional","affiliation":[]},{"given":"Mohamad Yusoff","family":"Bin Alias","sequence":"additional","affiliation":[]},{"given":"Abdul Aziz","family":"Abdul Rahman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Cooperative Beamforming and User Selection for Physical Layer Security in Relay Systems","year":"0","author":"hoang","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2017.8171158"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2017.8006841"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2014.6853869"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2459592"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2633387"},{"key":"ref16","first-page":"356","article-title":"Secrecy Capacity of Wireless Channels","volume":"1","author":"rodrigues","year":"2006"},{"article-title":"Secrecy Outage Probability with Destination Assisted Jamming in Presence of an Untrusted Relay","year":"2016","author":"kumar","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2383397"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2015.2421893"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/18.825796"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"journal-title":"Modern Wireless Communication","year":"2005","author":"hayhin","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2746104"},{"key":"ref8","first-page":"656","article-title":"Communication Theory of Secrecy Systems*","author":"shannon","year":"1948"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7018202"},{"key":"ref2","first-page":"5","article-title":"Implementation of encryption services in the OSI upper layers","author":"crei","year":"1988"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1618130114"},{"year":"1975","key":"ref9","article-title":"The Wire-Tap Channel"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2016.7504462"},{"key":"ref21","first-page":"2911","article-title":"Joint cooperative-space beamforming and jamming to secure af relay systems with individual power constraint","volume":"20","author":"wang","year":"0","journal-title":"ICASSp IEEE Int Conf Acoust Speech Signal Process - Proc"}],"event":{"name":"2018 International Symposium on Information Theory and Its Applications (ISITA)","start":{"date-parts":[[2018,10,28]]},"location":"Singapore","end":{"date-parts":[[2018,10,31]]}},"container-title":["2018 International Symposium on Information Theory and Its Applications (ISITA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8660385\/8664205\/08664383.pdf?arnumber=8664383","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T06:45:56Z","timestamp":1643265956000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8664383\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":21,"URL":"https:\/\/doi.org\/10.23919\/isita.2018.8664383","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}