-
1
-
-
0016562514
-
The wire-tap channel
-
jan
-
A. Wyner "The wire-tap channel," Bell. Syst Tech. J, vol.54, no.8, pp.1355-1387,jan 1975.
-
(1975)
Bell. Syst Tech. J
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.1
-
2
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszar and J. Komer "Broadcast channels with confidential messages," IEEE Trans. Inform. Theory, vol.IT-24, no.3, pp.339-348, May 1978.
-
(1978)
IEEE Trans. Inform. Theory
, vol.IT-24
, Issue.3
, pp. 339-348
-
-
Csiszar, I.1
Komer, J.2
-
3
-
-
0017996501
-
The Gaussian wire-tap channel
-
July
-
S. K. Leung-Yan-Cheong and M. E. Hellman "The Gaussian wire-tap channel," IEEE Trans. Inform. Theory, vol.IT-24, no.4, pp.451-456,July 1978.
-
(1978)
IEEE Trans. Inform. Theory
, vol.IT-24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.K.1
Hellman, M.E.2
-
4
-
-
45249119255
-
Secure communication over fading channels
-
(Shitz), June
-
Y. Liang, H. V. Poor, and S. Shamai (Shitz),"Secure communication over fading channels," IEEE Trans. Inform. Theory, vol. 54, pp. 2470 - 2492, June 2008.
-
(2008)
IEEE Trans. Inform. Theory
, vol.54
, pp. 2470-2492
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
5
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct
-
P. K. Gopala, L. Lai, and H. E. Gamal, "On the secrecy capacity of fading channels" IEEE Trans. Inform. Theory, vol.54, no.10, pp.4687-4698, Oct 2008.
-
(2008)
IEEE Trans. Inform. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
Gamal, H.E.3
-
8
-
-
45249090083
-
Discrete memoryless interference and broadcast channels with confidential messages: Secrecy capacity regions
-
Jun
-
R. Liu, I. Marie, P. Spasojevic and R. D. Yates, "Discrete memoryless interference and broadcast channels with confidential messages: Secrecy capacity regions," IEEE Trans.Inf. Theory, vol. 54, no. 6, pp. 2493-2507, Jun .2008.
-
(2008)
IEEE Trans.Inf. Theory
, vol.54
, Issue.6
, pp. 2493-2507
-
-
Liu, R.1
Marie, I.2
Spasojevic, P.3
Yates, R.D.4
-
9
-
-
62749109096
-
Secrecy capacity region of a multi-antenna Gaussian broadcast channel with confidential messages
-
Mar.
-
R. Liu and H. V. Poor, "Secrecy capacity region of a multi-antenna Gaussian broadcast channel with confidential messages," IEEE Trans. Inf. Theory, vol. 55, no. 3, pp. 1235-1249, Mar. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.3
, pp. 1235-1249
-
-
Liu, R.1
Poor, H.V.2
-
10
-
-
34547535342
-
Network beamforming using relays with perfect channel information
-
Y.Jing and H.Jafarkhani, "Network beamforming using relays with perfect channel information," IEEE International Conference on Acoustics , Speech, and Signal Processing, Honolulu, Hawaii, Apr. 15-20, 2007.
-
IEEE International Conference on Acoustics, Speech, and Signal Processing, Honolulu, Hawaii, Apr. 15-20, 2007
-
-
Jing, Y.1
Jafarkhani, H.2
-
11
-
-
84867430771
-
Collaborative-relay beamforming with perfect CSI: Optimum and distributed implementation
-
Apr.
-
G. Zheng, K. Wong, A. Paulraj, and B. Ottersten, "Collaborative- relay beamforming with perfect CSI: Optimum and distributed implementation, " IEEE Signal Process Letters, vol. 16, no. 4, Apr. 2009
-
(2009)
IEEE Signal Process Letters
, vol.16
, Issue.4
-
-
Zheng, G.1
Wong, K.2
Paulraj, A.3
Ottersten, B.4
-
12
-
-
66949167419
-
Network beamforming using relays with perfect channel information
-
June
-
Y. Jing and H. Jafarkhani, "Network beamforming using relays with perfect channel information," IEEE Trans. Inf. Theory, vol. 55, pp. 2499-2517, June 2009
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, pp. 2499-2517
-
-
Jing, Y.1
Jafarkhani, H.2
-
13
-
-
65449132856
-
Distributed beamforming for relay networks based on second order statistics of the channel state information
-
Sept.
-
V. Nassab, S. Shahbazpanahi, A. Grami, and Z.-Q. Luo," Distributed beamforming for relay networks based on second order statistics of the channel state information," IEEE Trans. on Signal Proc., Vol. 56, No 9, pp. 4306-4316, Sept. 2008.
-
(2008)
IEEE Trans. on Signal Proc.
, vol.56
, Issue.9
, pp. 4306-4316
-
-
Nassab, V.1
Shahbazpanahi, S.2
Grami, A.3
Luo, Z.-Q.4
-
14
-
-
68249162098
-
Robust collaborative-relay beamforming
-
Aug.
-
G. Zheng, K. K. Wong, A. Paulraj, and B. Ottersten, "Robust collaborative-relay beamforming," IEEE Trans. on Signal Proc., vol. 57, no. 8, Aug. 2009
-
(2009)
IEEE Trans. on Signal Proc.
, vol.57
, Issue.8
-
-
Zheng, G.1
Wong, K.K.2
Paulraj, A.3
Ottersten, B.4
-
15
-
-
64549128283
-
Secure wireless communications via cooperation
-
L. Dong, Z. Han, A. Petropulu and H. V. Poor, "Secure wireless communications via cooperation," Proc. 46th Annual Allerton Conf. Commun., Control, and Computing, Monticello, IL, Sept. 2008.
-
Proc. 46th Annual Allerton Conf. Commun., Control, and Computing, Monticello, IL, Sept. 2008
-
-
Dong, L.1
Han, Z.2
Petropulu, A.3
Poor, H.V.4
-
16
-
-
70349218031
-
Amplify-and-forward based cooperation for secure wireless communications
-
L. Dong, Z. Han, A. Petropulu, and H. V. Poor, "Amplify-and-forward based cooperation for secure wireless communications," Proc. IEEE Intl Conf. Acoust . Speech Signal Proc., Taipei, Taiwan, Apr. 2009.
-
Proc. IEEE Intl Conf. Acoust. Speech Signal Proc., Taipei, Taiwan, Apr. 2009
-
-
Dong, L.1
Han, Z.2
Petropulu, A.3
Poor, H.V.4
-
18
-
-
77955366092
-
Collaborative relay beamforming for secrecy
-
to appear in the Available
-
J. Zhang and M. C. Gursoy, "Collaborative relay beamforming for secrecy," to appear in the Proc. of the IEEE International Conference on Communication (ICC), Cape Town, South Africa, May 2010. Available: http://arxiv.orglabs/0910.4132
-
Proc. of the IEEE International Conference on Communication (ICC), Cape Town, South Africa, May 2010
-
-
Zhang, J.1
Gursoy, M.C.2
-
21
-
-
18144378765
-
Robust uplink bearnforming basd upon minimum outage probability criterion
-
B. K. Chalise and A. Czylwik, "Robust uplink bearnforming basd upon minimum outage probability criterion," IEEE Globecomm , 2004.
-
(2004)
IEEE Globecomm
-
-
Chalise, B.K.1
Czylwik, A.2
-
22
-
-
0033296299
-
Using SeDuMi 1.02: A MATLAB toolbox for optimization over symmetric cones
-
Special issue on Interior Point Methods (CD supplement with software)
-
J. Sturm, "Using SeDuMi 1.02: A MATLAB toolbox for optimization over symmetric cones," Opt. Methods and Software, vol. 11-12, pp. 625-653,1999, Special issue on Interior Point Methods (CD supplement with software).
-
(1999)
Opt. Methods and Software
, vol.11-12
, pp. 625-653
-
-
Sturm, J.1
-
23
-
-
20344396845
-
YALMIP: A toolbox for modeling and optimization in MATLAB
-
[Online]. Available
-
J. Lofberg, "YALMIP: A toolbox for modeling and optimization in MATLAB," Proc. the CACSD Conf., Taipei, Taiwan, 2004. [Online]. Available: http://control.ee.ethz.chljoloef/yalmip.php.
-
Proc. the CACSD Conf., Taipei, Taiwan, 2004
-
-
Lofberg, J.1
|