{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T08:32:18Z","timestamp":1723019538011},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2017,9,1]],"date-time":"2017-09-01T00:00:00Z","timestamp":1504224000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cogn. Commun. Netw."],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/tccn.2017.2729562","type":"journal-article","created":{"date-parts":[[2017,7,20]],"date-time":"2017-07-20T18:08:36Z","timestamp":1500574116000},"page":"343-360","source":"Crossref","is-referenced-by-count":12,"title":["Secrecy Capacity in CRN With Malicious Energy Harvester Using Game Theoretic Techniques"],"prefix":"10.1109","volume":"3","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-8548-7094","authenticated-orcid":false,"given":"Saptarshi","family":"Ghosh","sequence":"first","affiliation":[]},{"given":"Manav R.","family":"Bhatnagar","sequence":"additional","affiliation":[]},{"given":"Ajay","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Bijaya K.","family":"Panigrahi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","first-page":"404","article-title":"Worst-case equilibria","author":"koutsoupias","year":"1999","journal-title":"Proc STACS"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5907.2006.00180.x"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1111\/1468-0262.00223"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.090323"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2322076"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2014.2368695"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2477050"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2016.2565466"},{"key":"ref14","author":"fudenberg","year":"1991","journal-title":"Game Theory"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2536734"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2014.6875015"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.23919\/WIOPT.2017.7959919"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364491"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5683465"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2418297"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2013.13.120855"},{"key":"ref27","author":"neumark","year":"1965","journal-title":"Solution of Cubic and Quartic Equations"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2010.5513714"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2368999"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2014.012314.00178"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2013.071813.130105"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2015.2488620"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.141108"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2008.4595260"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2314654"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2016.7841565"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2009.2038412"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2330342"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2012.6415636"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2016.7778754"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"831","DOI":"10.1109\/TIFS.2011.2144585","article-title":"An information secrecy game in cognitive radio networks","volume":"6","author":"wu","year":"2011","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"ref26","first-page":"56","article-title":"Solving sextic equations","volume":"3","author":"kulkarni","year":"2008","journal-title":"Atlantic Electronic Journal of Mathematics"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441"}],"container-title":["IEEE Transactions on Cognitive Communications and Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6687307\/8061077\/07987049.pdf?arnumber=7987049","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:39:23Z","timestamp":1642005563000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7987049\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":33,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tccn.2017.2729562","relation":{},"ISSN":["2332-7731"],"issn-type":[{"value":"2332-7731","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,9]]}}}