-
1
-
-
54849430727
-
Identitybased key management in mobile ad hoc networks: Techniques and applications
-
Oct.
-
E. D. Silva, A. L. D. Santos, L. C. P. Albini, and M. Lima, "Identitybased key management in mobile ad hoc networks: techniques and applications," IEEE Wireless Commun., vol.15, pp. 46-52, Oct. 2008.
-
(2008)
IEEE Wireless Commun.
, vol.15
, pp. 46-521
-
-
Silva, E.D.1
Santos, A.L.D.2
Albini, L.C.P.3
Lima, M.4
-
2
-
-
0016562514
-
The wire-tap channel
-
Jan.
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol.54, pp. 1355-1387, Jan. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
-
3
-
-
0017973511
-
Broadcast channels with confidential messages
-
July
-
I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inform. Theory, vol.24, pp. 451-456, July 1978.
-
(1978)
IEEE Trans. Inform. Theory
, vol.24
, pp. 451-456
-
-
Csiszar, I.1
Korner, J.2
-
4
-
-
45249090083
-
Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions
-
June
-
R. Liu, I. Maric, P. Spasojevic, and R. D. Yates, "Discrete memoryless interference and broadcast channels with confidential messages: secrecy rate regions," IEEE Trans. Inform. Theory, vol.54, pp. 2493-2507, June 2008.
-
(2008)
IEEE Trans. Inform. Theory
, vol.54
, pp. 2493-2507
-
-
Liu, R.1
Maric, I.2
Spasojevic, P.3
Yates, R.D.4
-
5
-
-
45249104850
-
Wireless information-theoretic security
-
June
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inform. Theory, vol.54, pp. 2515-2534, June 2008.
-
(2008)
IEEE Trans. Inform. Theory
, vol.54
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
6
-
-
39049144353
-
Secrecy capacity of wireless channels
-
USA, July
-
J. Barros and M. R. D. Rodrigues, "Secrecy capacity of wireless channels," in Proc. IEEE Int. Symp. Inf. Theory, Seattle, USA, pp. 356- 360, July 2006.
-
(2006)
Proc. IEEE Int. Symp. Inf. Theory, Seattle
, pp. 356-360
-
-
Barros, J.1
Rodrigues, M.R.D.2
-
7
-
-
52949087579
-
Wireless broadcast networks: Reliability, security, and stability
-
San Diego, CA, USA, Feb.
-
Y. Liang, H. V. Poor, and L. Ying, "Wireless broadcast networks: reliability, security, and stability," in Proc. IEEE Inf. Theory Appl. Work., San Diego, CA, USA, pp. 249-255, Feb. 2008.
-
(2008)
Proc. IEEE Inf. Theory Appl. Work.
, pp. 249-255
-
-
Liang, Y.1
Poor, H.V.2
Ying, L.3
-
8
-
-
64549128283
-
Secure wireless communications via cooperation
-
Urbana-Champaign, IL, USA, Sept.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Secure wireless communications via cooperation," in Proc. Allerton Conf. Commun. Cont. Comp., Urbana-Champaign, IL, USA, Sept. 2008.
-
(2008)
Proc. Allerton Conf. Commun. Cont. Comp.
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
9
-
-
79955746213
-
On the diversity order and secrecy rate of non-orthogonal amplify-and-forward relay protocols
-
submitted for publication Nov. Available online
-
I. Krikidis, J. Thompson, and S. McLaughlin, "On the diversity order and secrecy rate of non-orthogonal amplify-and-forward relay protocols," IEEE Trans. Wireless Commun., submitted for publication Nov. 2008. [Available online: www.see.ed.ac.uk/ikrikidi/paper-TWC.pdf]
-
(2008)
IEEE Trans. Wireless Commun.
-
-
Krikidis, I.1
Thompson, J.2
McLaughlin, S.3
-
10
-
-
5044252003
-
Cooperative divesrity in wireless networks: Efficient protocols and outage behavior
-
Dec.
-
J. N. Laneman, D. N. C. Tse, and G. W. Wornell, "Cooperative divesrity in wireless networks: efficient protocols and outage behavior," IEEE Trans. Inform. Theory, vol.50, pp. 3062-3080, Dec. 2004.
-
(2004)
IEEE Trans. Inform. Theory
, vol.50
, pp. 3062-3080
-
-
Laneman, J.N.1
Tse, D.N.C.2
Wornell, G.W.3
-
11
-
-
35448931484
-
Cooperative communications with outage-optimal opportunistic relaying
-
DOI 10.1109/TWC.2007.06020050
-
A. Bletsas, H. Shin, and M. Z. Win, "Cooperative communications with outage-optimal opportunistic relaying," IEEE Trans. Wireless Commun., vol.6, pp. 3450-3460, Sept. 2007. (Pubitemid 47625224)
-
(2007)
IEEE Transactions on Wireless Communications
, vol.6
, Issue.9
, pp. 3450-3460
-
-
Bletsas, A.1
Shin, H.2
Win, M.Z.3
-
12
-
-
36248968306
-
Towards the optimal amplify-and-forward cooperative diversity scheme
-
Sept.
-
S. Yang and J.-C. Belfiore, "Towards the optimal amplify-and-forward cooperative diversity scheme," IEEE Trans. Inform. Theory, vol.53, pp. 3114-3126, Sept. 2007.
-
(2007)
IEEE Trans. Inform. Theory
, vol.53
, pp. 3114-3126
-
-
Yang, S.1
Belfiore, J.-C.2
-
13
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
Sept.
-
L. Lai and H. El Gamal, "The relay-eavesdropper channel: cooperation for secrecy," IEEE Trans. Inform. Theory, vol.54, pp. 4005-4019, Sept. 2008.
-
(2008)
IEEE Trans. Inform. Theory
, vol.54
, pp. 4005-4019
-
-
Lai, L.1
El Gamal, H.2
-
14
-
-
51349098469
-
Relay channels with confidential messages
-
submitted for publication Mar. Available online
-
Y. Oohama, "Relay channels with confidential messages," IEEE Trans. Inform. Theory, submitted for publication Mar. 2007. [Available online: http://arxiv.org/pdf/cs/0611125v7].
-
(2007)
IEEE Trans. Inform. Theory
-
-
Oohama, Y.1
-
15
-
-
69249217813
-
Secrecy capacity of a class of orthogonal relay eavesdropper channels
-
accepted for publication, June
-
V. Aggarwal, L. Sankar, A. R. Calderbank, and H. V. Poor, "Secrecy capacity of a class of orthogonal relay eavesdropper channels," EURASIP J. Wireless Commun. Net., accepted for publication, June 2009.
-
(2009)
EURASIP J. Wireless Commun. Net.
-
-
Aggarwal, V.1
Sankar, L.2
Calderbank, A.R.3
Poor, H.V.4
-
16
-
-
70350611439
-
Opportunistic relay selection for cooperative networks with secrecy constraints
-
submitted for publication, July
-
I. Krikidis, "Opportunistic relay selection for cooperative networks with secrecy constraints," IEEE Signal Processing Lett., submitted for publication, July 2009.
-
(2009)
IEEE Signal Processing Lett.
-
-
Krikidis, I.1
-
17
-
-
41849091900
-
Secure communications via cooperating base stations
-
Mar.
-
O. Simeone and P. Popovski, "Secure communications via cooperating base stations," IEEE Commun. Lett., vol.12, pp. 188-190, Mar. 2008.
-
(2008)
IEEE Commun. Lett.
, vol.12
, pp. 188-190
-
-
Simeone, O.1
Popovski, P.2
-
18
-
-
67649499991
-
Wireless secrecy in cellular systems with infrastructure-aided cooperation
-
June
-
P. Popovski and O. Simeone, "Wireless secrecy in cellular systems with infrastructure-aided cooperation," IEEE Trans. Inform. Foren. Sec., vol.4, pp. 242-256, June 2009.
-
(2009)
IEEE Trans. Inform. Foren. Sec.
, vol.4
, pp. 242-256
-
-
Popovski, P.1
Simeone, O.2
-
19
-
-
45249101530
-
The general Gaussian multiple access and two-way wire-tap channels: Achievable rates and cooperative jamming
-
June
-
E. Tekin and A. Yener, "The general Gaussian multiple access and two-way wire-tap channels: achievable rates and cooperative jamming," IEEE Trans. Inform. Theory, vol.54, pp. 2735-2751, June 2008.
-
(2008)
IEEE Trans. Inform. Theory
, vol.54
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
21
-
-
67651163702
-
Average SNR and ergodic capacity analysis for opportunistic DF relaying over Rayleigh fading channels
-
June
-
S. Lee, M. Han, and D. Hong, "Average SNR and ergodic capacity analysis for opportunistic DF relaying over Rayleigh fading channels," IEEE Trans. Wireless Commun., vol.8, pp. 2807-2812, June 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, pp. 2807-2812
-
-
Lee, S.1
Han, M.2
Hong, D.3
-
22
-
-
57149124885
-
Threshold selection for SNR-based selective digital relaying in cooperative wireless networks
-
Nov.
-
F. A. Onat, A. Adinoyi, Y. Fan, H. Yanikomeroglu, J. S. Thompson, and I. D. Marsland, "Threshold selection for SNR-based selective digital relaying in cooperative wireless networks," IEEE Trans. Wireless Commun., vol.7, pp. 4226-4237, Nov. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, pp. 4226-4237
-
-
Onat, F.A.1
Adinoyi, A.2
Fan, Y.3
Yanikomeroglu, H.4
Thompson, J.S.5
Marsland, I.D.6
-
23
-
-
64249156371
-
On the throughput of secure hybrid-ARQ protocols for Gaussian block-fading channels
-
Apr.
-
X. Tang, R. Liu, P. Spasojevic, and H. V. Poor, "On the throughput of secure hybrid-ARQ protocols for Gaussian block-fading channels," IEEE Trans. Inform. Theory, vol.55, pp. 1575-1591, Apr. 2009.
-
(2009)
IEEE Trans. Inform. Theory
, vol.55
, pp. 1575-1591
-
-
Tang, X.1
Liu, R.2
Spasojevic, P.3
Poor, H.V.4
|