Security Analysis of Overlay Cognitive Wireless Networks with an Untrusted Secondary User | IEEE Conference Publication | IEEE Xplore