-
1
-
-
0345258506
-
User cooperation diversity-Part I: System description
-
Nov
-
A. Sendonaris, E. Erkip, and B. Aazhang, "User cooperation diversity-Part I: System description", IEEE Trans. Commun., vol. 51, no. 11, pp. 1927-1938, Nov. 2003.
-
(2003)
IEEE Trans. Commun.
, vol.51
, Issue.11
, pp. 1927-1938
-
-
Sendonaris, A.1
Erkip, E.2
Aazhang, B.3
-
2
-
-
5044252003
-
Cooperative diversity in wireless networks: Efficient protocols and outage behavior
-
Dec
-
J. N. Laneman, D. N. C. Tse, and G. W. Wornell, "Cooperative diversity in wireless networks: Efficient protocols and outage behavior", IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3062-3080, Dec. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.12
, pp. 3062-3080
-
-
Laneman, J.N.1
Tse, D.N.C.2
Wornell, G.W.3
-
3
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, "The wire-tap channel", Bell Syst. Tech. J., vol. 54, pp. 1355-1387, 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
-
4
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
Jun
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise", IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
5
-
-
45249101530
-
The general Gaussian multiple-access and two-way wire-tap channels: Achievable rates and cooperative jamming
-
Jun
-
E. Tekin and A. Yener, "The general Gaussian multiple-access and two-way wire-tap channels: Achievable rates and cooperative jamming", IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
6
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
Sep
-
L. Lai and H. E. Gamal, "The relay-eavesdropper channel: Cooperation for secrecy", IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.9
, pp. 4005-4019
-
-
Lai, L.1
Gamal, H.E.2
-
7
-
-
51849144195
-
Interference-assisted secret communication
-
Porto, Portugal
-
X. Tang, R. Liu, P. Spasojevic, and H. Poor, "Interference-assisted secret communication", in Proc. IEEE Information Theory Workshop (ITW), Porto, Portugal, 2008, pp. 164-168.
-
(2008)
Proc. IEEE Information Theory Workshop (ITW)
, pp. 164-168
-
-
Tang, X.1
Liu, R.2
Spasojevic, P.3
Poor, H.4
-
8
-
-
39049089566
-
The discrete memoryless multiple access channel with confidential messages
-
Seattle, WA, Jul
-
R. Liu, I. Maric, R. Yates, and P. Spasojevic, "The discrete memoryless multiple access channel with confidential messages", in Proc. IEEE Int. Symp. Information Theory, Seattle, WA, Jul. 2006.
-
(2006)
Proc. IEEE Int. Symp. Information Theory
-
-
Liu, R.1
Maric, I.2
Yates, R.3
Spasojevic, P.4
-
9
-
-
40949147785
-
Multiple-access channels with confidential messages
-
DOI 10.1109/TIT.2007.915978
-
Y. Liang and H. V. Poor, "Multiple-access channels with confidential messages", IEEE Trans. Inf. Theory, vol. 54, no. 3, pp. 976-1002, Mar. 2008. (Pubitemid 351410914)
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.3
, pp. 976-1002
-
-
Liang, Y.1
Poor, H.V.2
-
10
-
-
57349093480
-
The Gaussian multiple access wire-tap channel
-
Dec
-
E. Tekin and A. Yener, "The Gaussian multiple access wire-tap channel", IEEE Trans. Inf. Theory, vol. 54, no. 12, pp. 5747-5755, Dec. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.12
, pp. 5747-5755
-
-
Tekin, E.1
Yener, A.2
-
11
-
-
79957465600
-
Wireless secrecy regions with friendly jamming
-
Jun
-
J. P. Vilela, M. Bloch, J. Barros, and S. W. McLaughlin, "Wireless secrecy regions with friendly jamming", IEEE Trans. Inf. Forensics Security, vol. 6, no. 2, pp. 256-266, Jun. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.2
, pp. 256-266
-
-
Vilela, J.P.1
Bloch, M.2
Barros, J.3
McLaughlin, S.W.4
-
12
-
-
70449514539
-
Wireless physical-layer security: The case of colluding eavesdroppers
-
Seoul, Korea
-
P. Pinto, J. Barros, and M. Win, "Wireless physical-layer security: The case of colluding eavesdroppers", in Proc. 2009 IEEE Int. Symp. Information Theory (ISIT), Seoul, Korea, 2009, pp. 2442-2446.
-
(2009)
Proc. 2009 IEEE Int. Symp. Information Theory (ISIT)
, pp. 2442-2446
-
-
Pinto, P.1
Barros, J.2
Win, M.3
-
13
-
-
79551617822
-
Techniques for enhanced physical-layer security
-
Miami, FL, Dec
-
P. Pinto, J. Barros, and M. Win, "Techniques for enhanced physical-layer security", in Proc. IEEE Global Telecommunications Conf. (GLOBECOM), Miami, FL, Dec. 2010.
-
(2010)
Proc. IEEE Global Telecommunications Conf. (GLOBECOM)
-
-
Pinto, P.1
Barros, J.2
Win, M.3
-
14
-
-
0003523893
-
-
London, U. K.: Oxford Univ. Press
-
J. Kingman, Poisson Processes. London, U. K.: Oxford Univ. Press, 1993.
-
(1993)
Poisson Processes.
-
-
Kingman, J.1
-
15
-
-
79957978453
-
Stochastic geometry and random graphs for the analysis and design of wireless networks
-
Sep
-
M. Haenggi, J. G. Andrews, F. Baccelli, O. Dousse, and M. Franceschetti, "Stochastic geometry and random graphs for the analysis and design of wireless networks", IEEE J. Sel. Areas Commun., vol. 27, no. 7, pp. 1029-1046, Sep. 2009.
-
(2009)
IEEE J. Sel. Areas Commun.
, vol.27
, Issue.7
, pp. 1029-1046
-
-
Haenggi, M.1
Andrews, J.G.2
Baccelli, F.3
Dousse, O.4
Franceschetti, M.5
-
17
-
-
62349109352
-
A unified analysis of connectivity and throughput in packet radio networks
-
San Diego, CA, Nov
-
P. Pinto and M. Win, "A unified analysis of connectivity and throughput in packet radio networks", in Proc. IEEE Military Communications Conf., 2008 (MILCOM 2008), San Diego, CA, Nov. 2008, pp. 1-7.
-
(2008)
Proc. IEEE Military Communications Conf., 2008 (MILCOM 2008)
, pp. 1-7
-
-
Pinto, P.1
Win, M.2
-
19
-
-
84907689849
-
RTS/CTS-induced congestion in ad hoc wireless LANs
-
New Orleans, LA
-
S. Ray, J. Carruthers, and D. Starobinski, "RTS/CTS-induced congestion in ad hoc wireless LANs", in Proc. IEEE Wireless Communications & Networking Conf., New Orleans, LA, 2003, vol. 3, pp. 1516-1521.
-
(2003)
Proc. IEEE Wireless Communications & Networking Conf.
, vol.3
, pp. 1516-1521
-
-
Ray, S.1
Carruthers, J.2
Starobinski, D.3
-
20
-
-
78751535549
-
Cooperative jamming: The tale of friendly interference for secrecy
-
Eds., in, New York: Springer
-
X. He and A. Yener, R. Liu and W. Trappe, Eds., "Cooperative jamming: The tale of friendly interference for secrecy", in Securing Wireless Communications at the Physical Layer. New York: Springer, 2009, pp. 65-88.
-
(2009)
Securing Wireless Communications at the Physical Layer.
, pp. 65-88
-
-
He, X.1
Yener, A.2
Liu, R.3
Trappe, W.4
-
21
-
-
24944442942
-
Connectivity in the presence of shadowing in 802.11 Ad Hoc Networks
-
NET42-4, 2005 IEEE Wireless Communications and Networking Conference, WCNC 2005: Broadband Wireless for the Masses - Ready for Take-off
-
P. Stuedi, O. Chinellato, and G. Alonso, "Connectivity in the presence of shadowing in 802.11 ad hoc networks", in Proc. IEEE Wireless Communications and Networking Conf., New Orleans, LA, 2005, vol. 4, pp. 2225-2230. (Pubitemid 41310840)
-
(2005)
IEEE Wireless Communications and Networking Conference, WCNC
, vol.4
, pp. 2225-2230
-
-
Stuedi, P.1
Chinellato, O.2
Alonso, G.3
|