{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:23:26Z","timestamp":1740122606972,"version":"3.37.3"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2015,7,23]],"date-time":"2015-07-23T00:00:00Z","timestamp":1437609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1007\/s11277-015-2881-5","type":"journal-article","created":{"date-parts":[[2015,7,21]],"date-time":"2015-07-21T22:55:28Z","timestamp":1437519328000},"page":"1945-1956","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Secure Communication in Amplify-and-Forward Networks with Multiple Eavesdroppers: Decoding with SNR Thresholds"],"prefix":"10.1007","volume":"85","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3008-7445","authenticated-orcid":false,"given":"Siddhartha","family":"Sarma","sequence":"first","affiliation":[]},{"given":"Samar","family":"Agnihotri","sequence":"additional","affiliation":[]},{"given":"Joy","family":"Kuri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,23]]},"reference":[{"key":"2881_CR1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511977985","volume-title":"Physical-layer security: From information theory to security engineering","author":"M Bloch","year":"2011","unstructured":"Bloch, M., & Barros, J. (2011). Physical-layer security: From information theory to security engineering. Cambridge: Cambridge University Press."},{"issue":"4","key":"2881_CR2","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1109\/TIT.1978.1055917","volume":"24","author":"S Leung-Yan-Cheong","year":"1978","unstructured":"Leung-Yan-Cheong, S., & Hellman, M. (1978). The Gaussian wire-tap channel. IEEE Transactions on Information Theory, 24(4), 451\u2013456.","journal-title":"IEEE Transactions on Information Theory"},{"key":"2881_CR3","doi-asserted-by":"crossref","unstructured":"Lai, L., & El Gamal, H. (2007). Cooperative secrecy: The relay-eavesdropper channel. In IEEE international symposium on information theory (ISIT) (pp. 931\u2013935).","DOI":"10.1109\/ISIT.2007.4557343"},{"key":"2881_CR4","doi-asserted-by":"crossref","unstructured":"Dong, L., Han, Z., Petropulu, A., & Poor, H. (2009). Amplify-and-forward based cooperation for secure wireless communications. In IEEE international conference on acoustics, speech and signal processing (ICASSP), pp. 2613\u20132616","DOI":"10.1109\/ICASSP.2009.4960158"},{"key":"2881_CR5","doi-asserted-by":"crossref","unstructured":"Zhang, J., & Gursoy, M. (2010). Relay beamforming strategies for physical-layer security. In 44th annual conference on information sciences and systems (CISS), pp. 1\u20136","DOI":"10.1109\/CISS.2010.5464970"},{"issue":"1","key":"2881_CR6","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1109\/LSP.2012.2227313","volume":"20","author":"Y Yang","year":"2013","unstructured":"Yang, Y., Li, Q., Ma, W. K., Ge, J., & Ching, P. (2013). Cooperative secure beamforming for AF relay networks with multiple eavesdroppers. IEEE Signal Processing Letters, 20(1), 35\u201338.","journal-title":"IEEE Signal Processing Letters"},{"issue":"8","key":"2881_CR7","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"A Wyner","year":"1975","unstructured":"Wyner, A. (1975). The wire-tap channel. Bell Systems Technical Journal, 54(8), 1355\u20131387.","journal-title":"Bell Systems Technical Journal"},{"issue":"2","key":"2881_CR8","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1137\/070679041","volume":"19","author":"S He","year":"2008","unstructured":"He, S., Luo, Z. Q., Nie, J., & Zhang, S. (2008). Semidefinite relaxation bounds for indefinite homogeneous quadratic optimization. SIAM Journal on Optimization, 19(2), 503\u2013523.","journal-title":"SIAM Journal on Optimization"},{"key":"2881_CR9","doi-asserted-by":"crossref","unstructured":"Agnihotri, S., Jaggi, S., & Chen, M. (2011). Amplify-and-forward in wireless relay networks. In IEEE information theory workshop (ITW) (pp. 311\u2013315).","DOI":"10.1109\/ITW.2011.6089444"},{"key":"2881_CR10","doi-asserted-by":"crossref","unstructured":"Zhao, Y., Adve, R., & Lim, T. J. (2006). Improving amplify-and-forward relay networks: Optimal power allocation versus selection. In IEEE international symposium on information theory (ISIT) (pp. 1234\u20131238).","DOI":"10.1109\/ISIT.2006.262002"},{"issue":"7","key":"2881_CR11","doi-asserted-by":"crossref","first-page":"3532","DOI":"10.1109\/TSP.2012.2191543","volume":"60","author":"HM Wang","year":"2012","unstructured":"Wang, H. M., Yin, Q., & Xia, X. G. (2012). Distributed beamforming for physical-layer security of two-way relay networks. IEEE Transactions on Signal Processing, 60(7), 3532\u20133545.","journal-title":"IEEE Transactions on Signal Processing"},{"key":"2881_CR12","doi-asserted-by":"crossref","unstructured":"Swindlehurst, A. (2009). Fixed SINR solutions for the MIMO wiretap channel. In IEEE international conference on acoustics, speech and signal processing (ICASSP) (pp. 2437\u20132440).","DOI":"10.1109\/ICASSP.2009.4960114"},{"issue":"3","key":"2881_CR13","doi-asserted-by":"crossref","first-page":"1202","DOI":"10.1109\/TSP.2010.2094610","volume":"59","author":"WC Liao","year":"2011","unstructured":"Liao, W. C., Chang, T. H., Ma, W. K., & Chi, C. Y. (2011). QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificial-noise-aided approach. IEEE Transactions on Signal Processing, 59(3), 1202\u20131216.","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"3","key":"2881_CR14","doi-asserted-by":"crossref","first-page":"1553","DOI":"10.1109\/TWC.2009.080649","volume":"8","author":"LP Qian","year":"2009","unstructured":"Qian, L. P., Zhang, Y., & Huang, J. (2009). MAPEL: Achieving global optimality for a non-convex wireless power control problem. IEEE Transactions on Wireless Communications, 8(3), 1553\u20131563.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"1","key":"2881_CR15","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1109\/LSP.2012.2227725","volume":"20","author":"HM Wang","year":"2013","unstructured":"Wang, H. M., Luo, M., Xia, X. G., & Yin, Q. (2013). Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper\u2019s CSI. IEEE Signal Processing Letters, 20(1), 39\u201342.","journal-title":"IEEE Signal Processing Letters"},{"key":"2881_CR16","doi-asserted-by":"crossref","unstructured":"Sankararaman, S., Abu-Affash, K., Efrat, A., Eriksson-Bique, S. D., Polishchuk, V., Ramasubramanian, S., et al. (2012). Optimization schemes for protective jamming. In Proceedings of the 13th ACM international symposium on mobile ad hoc networking and computing (pp. 65\u201374).","DOI":"10.1145\/2248371.2248383"},{"key":"2881_CR17","unstructured":"Sarma, S., Shukla, S., & Kuri, J. (2013). Joint scheduling and jamming for data secrecy in wireless networks. In 11th international symposium on modeling optimization in mobile, ad hoc wireless networks (WiOpt) (pp. 248\u2013255)."},{"issue":"4","key":"2881_CR18","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1023\/A:1012752110010","volume":"21","author":"JB Hiriart-Urruty","year":"2001","unstructured":"Hiriart-Urruty, J. B. (2001). Global optimality conditions in maximizing a convex quadratic function under convex quadratic constraints. Journal of Global Optimization, 21(4), 443\u2013453.","journal-title":"Journal of Global Optimization"},{"issue":"6","key":"2881_CR19","doi-asserted-by":"crossref","first-page":"1446","DOI":"10.1016\/j.laa.2011.03.027","volume":"435","author":"G Sagnol","year":"2011","unstructured":"Sagnol, G. (2011). A class of semidefinite programs with rank-one solutions. Linear Algebra and its Applications, 435(6), 1446\u20131463.","journal-title":"Linear Algebra and its Applications"},{"key":"2881_CR20","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1007\/978-1-4614-1927-3_14","volume-title":"Mixed integer nonlinear programming. IMA volumes in mathematics and its applications","author":"A Qualizza","year":"2012","unstructured":"Qualizza, A., Belotti, P., & Margot, F. (2012). Linear programming relaxations of quadratically constrained quadratic programs. In J. Lee & S. Leyffer (Eds.), Mixed integer nonlinear programming. IMA volumes in mathematics and its applications (Vol. 154, pp. 407\u2013426). New York: Springer."},{"issue":"3","key":"2881_CR21","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MSP.2010.936019","volume":"27","author":"ZQ Luo","year":"2010","unstructured":"Luo, Z. Q., Ma, W. K., So, A. C., Ye, Y., & Zhang, S. (2010). Semidefinite relaxation of quadratic optimization problems. IEEE Signal Processing Magazine, 27(3), 20\u201334.","journal-title":"IEEE Signal Processing Magazine"},{"volume-title":"Matrix analysis","year":"1986","key":"2881_CR22","unstructured":"Horn, R. A., & Johnson, C. R. (Eds.). (1986). Matrix analysis. New York, NY: Cambridge University Press."},{"key":"2881_CR23","doi-asserted-by":"crossref","unstructured":"Lofberg, J. (2004). YALMIP: A toolbox for modeling and optimization in MATLAB. In IEEE international symposium on computer aided control systems design (pp. 284\u2013289).","DOI":"10.1109\/CACSD.2004.1393890"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-2881-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-015-2881-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-2881-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T09:18:25Z","timestamp":1559380705000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-015-2881-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7,23]]},"references-count":23,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["2881"],"URL":"https:\/\/doi.org\/10.1007\/s11277-015-2881-5","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2015,7,23]]}}}