메뉴 건너뛰기




Volumn , Issue , 2010, Pages 2513-2517

A new jamming technique for secrecy in multi-antenna wireless networks

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL NOISE; CONSTANT ENVELOPE; CONSTANT MODULI; DESIRED SIGNAL; GAUSSIAN NOISE; GAUSSIANS; JAMMING TECHNIQUE; MULTI-ANTENNA WIRELESS; MULTIPLE ANTENNA; NOISE SIGNALS; PSEUDO-NOISE; SECURE WIRELESS COMMUNICATION;

EID: 77955703276     PISSN: 21578103     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISIT.2010.5513559     Document Type: Conference Paper
Times cited : (7)

References (21)
  • 2
    • 45849133457 scopus 로고    scopus 로고
    • Guaranteeing secrecy using artificial noise
    • June
    • S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Transactions on Wireless Communications, vol. 7, no. 6, pp. 2180-2189, June 2008.
    • (2008) IEEE Transactions on Wireless Communications , vol.7 , Issue.6 , pp. 2180-2189
    • Goel, S.1    Negi, R.2
  • 3
    • 0042826822 scopus 로고    scopus 로고
    • Independent component analysis: Algorithms and applications
    • DOI 10.1016/S0893-6080(00)00026-5, PII S0893608000000265
    • A. Hyvärinen and E. Oja, "Independent component analysis: algorithms and applications," Neural networks, vol. 13, no. 4-5, pp. 411-430, 2000. (Pubitemid 30447427)
    • (2000) Neural Networks , vol.13 , Issue.4-5 , pp. 411-430
    • Hyvarinen, A.1    Oja, E.2
  • 4
    • 0032188650 scopus 로고    scopus 로고
    • Blind equalization using the constant modulus criterion: A review
    • Oct
    • J. Johnson, R., P. Schniter, T. Endres, J. Behm, D. Brown, and R. Casas, "Blind equalization using the constant modulus criterion: a review," Proceedings of the IEEE, vol. 86, no. 10, pp. 1927-1950, Oct 1998.
    • (1998) Proceedings of the IEEE , vol.86 , Issue.10 , pp. 1927-1950
    • Johnson, J.1    Schniter, R.P.2    Endres, T.3    Behm, J.4    Brown, D.5    Casas, R.6
  • 5
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon, "Communication theory of secrecy systems," Bell System Technical Journal, vol. 28, pp. 656-715, 1949.
    • (1949) Bell System Technical Journal , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 6
    • 34347271683 scopus 로고    scopus 로고
    • A private key agreement scheme based on fluctuations of ber in wireless communications
    • The 9th International Conference on Feb.
    • T. Kitano, A. Kitaura, H. Iwai, and H. Sasaoka, "A private key agreement scheme based on fluctuations of ber in wireless communications," in Advanced Communication Technology, The 9th International Conference on, vol. 3, Feb. 2007, pp. 1495-1499.
    • (2007) Advanced Communication Technology , vol.3 , pp. 1495-1499
    • Kitano, T.1    Kitaura, A.2    Iwai, H.3    Sasaoka, H.4
  • 10
    • 0016562514 scopus 로고
    • The wire-tap channel
    • A. D. Wyner, "The wire-tap channel," Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, 1975.
    • (1975) Bell System Technical Journal , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 12
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Transactions on Information Theory, vol. 24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Transactions on Information Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszar, I.1    Korner, J.2
  • 16
  • 17
    • 0000746630 scopus 로고
    • Optimum information transmission through a channel with unknown parameters
    • R. Dobrushin, "Optimum information transmission through a channel with unknown parameters," Radio Eng. Electron, vol. 4, no. 12, pp. 1-8, 1959.
    • (1959) Radio Eng. Electron , vol.4 , Issue.12 , pp. 1-8
    • Dobrushin, R.1
  • 19
    • 0026913942 scopus 로고
    • Worst-case power-constrained noise for binary-input channels
    • S. Shamai and S. Verdu, "Worst-case power-constrained noise for binary-input channels," IEEE Transactions on Information Theory, vol. 38, no. 5, pp. 1494-1511, 1992.
    • (1992) IEEE Transactions on Information Theory , vol.38 , Issue.5 , pp. 1494-1511
    • Shamai, S.1    Verdu, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.