{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T07:10:49Z","timestamp":1723187449770},"reference-count":19,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T00:00:00Z","timestamp":1512086400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Physical Communication"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1016\/j.phycom.2016.05.003","type":"journal-article","created":{"date-parts":[[2016,6,27]],"date-time":"2016-06-27T00:27:39Z","timestamp":1466987259000},"page":"610-618","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":22,"special_numbering":"P2","title":["Secure communications in cognitive underlay networks over Nakagami-m<\/mml:mi><\/mml:math>channel"],"prefix":"10.1016","volume":"25","author":[{"given":"Nam-Phong","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Tu Lam","family":"Thanh","sequence":"additional","affiliation":[]},{"given":"Trung Q.","family":"Duong","sequence":"additional","affiliation":[]},{"given":"A.","family":"Nallanathan","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.phycom.2016.05.003_br000005","unstructured":"Federal Communications Commission, Spectrum Policy Task Force Report. ET Docket No. 02-155, 2002."},{"issue":"4","key":"10.1016\/j.phycom.2016.05.003_br000010","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1109\/98.788210","article-title":"Cognitive radio: Making software radios more personal","volume":"vol. 6","author":"Mitola","year":"1999","journal-title":"IEEE Pers. Commun."},{"issue":"5","key":"10.1016\/j.phycom.2016.05.003_br000015","doi-asserted-by":"crossref","first-page":"894","DOI":"10.1109\/JPROC.2009.2015717","article-title":"Breaking spectrum gridlock with cognitive radios: An information theoretic perspective","volume":"95","author":"Goldsmith","year":"2009","journal-title":"Proc. IEEE"},{"issue":"9","key":"10.1016\/j.phycom.2016.05.003_br000020","first-page":"29","article-title":"Cryptographic design vulnerabilities","volume":"31","author":"Schneier","year":"1998","journal-title":"IEEE Trans. Comput."},{"key":"10.1016\/j.phycom.2016.05.003_br000025","doi-asserted-by":"crossref","unstructured":"M. Debbah, Mobile flexible networks: The challenges ahead, in: Proc. IEEE ATC, Hanoi, Vietnam, Oct. 2008, pp. 3\u20137.","DOI":"10.1109\/ATC.2008.4760505"},{"issue":"8","key":"10.1016\/j.phycom.2016.05.003_br000030","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","article-title":"The wire-tap channel","volume":"54","author":"Wyner","year":"1975","journal-title":"Bell Syst. Tech. J."},{"key":"10.1016\/j.phycom.2016.05.003_br000035","first-page":"40","article-title":"Information and inference in the wireless physical layer","author":"Poor","year":"2012","journal-title":"IEEE Commun. Mag."},{"issue":"5","key":"10.1016\/j.phycom.2016.05.003_br000040","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1109\/LCOMM.2011.030911.102343","article-title":"Maximal ratio diversity combining enhanced security","volume":"15","author":"He","year":"2011","journal-title":"IEEE Commun. Lett."},{"issue":"3","key":"10.1016\/j.phycom.2016.05.003_br000045","doi-asserted-by":"crossref","first-page":"853","DOI":"10.1109\/TIFS.2011.2159491","article-title":"On wireless channels with m-antenna eavesdroppers: Characterization of the outage probability and outage secrecy capacity","volume":"6","author":"Prabhu","year":"2011","journal-title":"IEEE Trans. Inf. Forensics Security"},{"issue":"6","key":"10.1016\/j.phycom.2016.05.003_br000050","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1109\/LSP.2012.2195490","article-title":"Performance of transmit antenna selection physical layer security schemes","volume":"19","author":"Alves","year":"2012","journal-title":"IEEE Signal Process. Lett."},{"issue":"10","key":"10.1016\/j.phycom.2016.05.003_br000055","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1109\/TCOMM.2012.12.110670","article-title":"Transmit antenna selection for security enhancement in mimo wiretap channels","volume":"6","author":"Yang","year":"2013","journal-title":"IEEE Trans. Commun."},{"issue":"10","key":"10.1016\/j.phycom.2016.05.003_br000060","doi-asserted-by":"crossref","first-page":"2536","DOI":"10.1109\/TSP.2013.2247600","article-title":"Secure communication via an untrusted non-regenerative relay in fading channels","volume":"61","author":"Huang","year":"2013","journal-title":"IEEE Trans. Signal Process."},{"issue":"16","key":"10.1016\/j.phycom.2016.05.003_br000065","doi-asserted-by":"crossref","first-page":"2676","DOI":"10.1049\/iet-com.2011.0638","article-title":"Proposed relay selection scheme for physical layer security in cognitive radio networks","volume":"6","author":"Sakran","year":"2012","journal-title":"IET Commun."},{"issue":"1","key":"10.1016\/j.phycom.2016.05.003_br000070","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/LWC.2014.2365808","article-title":"Relay selection for security enhancement in cognitive relay networks","volume":"4","author":"Liu","year":"2015","journal-title":"IEEE Commun. Lett."},{"key":"10.1016\/j.phycom.2016.05.003_br000075","doi-asserted-by":"crossref","unstructured":"T.Q. Duong, T.T. Duy, M. Elkashlan, N.H. Tran, O.A. Dobre, Secured cooperative cognitive radio networks with relay selection, in: Proc. IEEE GLOBECOM, Austin, TX, Dec. 2014, pp. 3074\u20133079.","DOI":"10.1109\/GLOCOM.2014.7037277"},{"issue":"8","key":"10.1016\/j.phycom.2016.05.003_br000080","doi-asserted-by":"crossref","first-page":"3790","DOI":"10.1109\/TVT.2014.2358624","article-title":"On the security of cognitive radio networks","volume":"64","author":"Elkashlan","year":"2015","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"5","key":"10.1016\/j.phycom.2016.05.003_br000085","doi-asserted-by":"crossref","first-page":"2368","DOI":"10.1109\/TVT.2012.2192509","article-title":"Cognitive amplify-and-forward relay networks over Nakagami-m fading","volume":"61","author":"Duong","year":"2012","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.phycom.2016.05.003_br000090","series-title":"Table of Integrals, Series, and Products","author":"Gradshteyn","year":"2007"},{"issue":"6","key":"10.1016\/j.phycom.2016.05.003_br000095","doi-asserted-by":"crossref","first-page":"2515","DOI":"10.1109\/TIT.2008.921908","article-title":"Wireless information-theoretic security","volume":"54","author":"Bloch","year":"2008","journal-title":"IEEE Trans. Inf. Theory"}],"container-title":["Physical Communication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1874490716300398?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1874490716300398?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,9,10]],"date-time":"2019-09-10T06:57:27Z","timestamp":1568098647000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1874490716300398"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":19,"alternative-id":["S1874490716300398"],"URL":"https:\/\/doi.org\/10.1016\/j.phycom.2016.05.003","relation":{},"ISSN":["1874-4907"],"issn-type":[{"value":"1874-4907","type":"print"}],"subject":[],"published":{"date-parts":[[2017,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Secure communications in cognitive underlay networks over Nakagami- channel","name":"articletitle","label":"Article Title"},{"value":"Physical Communication","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.phycom.2016.05.003","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Crown Copyright \u00a9 2016 Published by Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}