-
1
-
-
0016562514
-
The wire-tap channel
-
A. D. wyner, "The wire-tap channel," Bell Sys. Tech. J., vol. 54, pp. 1355-1387, 1975.
-
(1975)
Bell Sys. Tech. J.
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
-
2
-
-
44049095075
-
Secret communication via multiantenna transmission
-
Z. Li, W. Trappe, and R. Yates, "Secret communication via multiantenna transmission," in Proc IEEE Conference on Information Sciences Systems, Baltimore, USA, 2007.
-
Proc IEEE Conference on Information Sciences Systems, Baltimore, USA, 2007
-
-
Li, Z.1
Trappe, W.2
Yates, R.3
-
3
-
-
51649110931
-
Achievable rates in Gaussian MISO channels with secrecy constraints
-
S. Shafiee and S. Ulukus, "Achievable rates in Gaussian MISO channels with secrecy constraints," in Proc. IEEE Int. Symp. Inf. Theory, Nice, France, 2007.
-
Proc. IEEE Int. Symp. Inf. Theory, Nice, France, 2007
-
-
Shafiee, S.1
Ulukus, S.2
-
4
-
-
72349099904
-
Cooperative jamming for wireless physical layer security
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Cooperative jamming for wireless physical layer security," in Proc. IEEE Workshop on Statistical Signal Proc., Cardiff, Wales, 2009.
-
Proc. IEEE Workshop on Statistical Signal Proc., Cardiff, Wales, 2009
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
5
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
L. Lai and H. El Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Transactions on Information Theory, vol. 54, pp. 4005-4019, 2008.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, pp. 4005-4019
-
-
Lai, L.1
El Gamal, H.2
-
6
-
-
70349175144
-
Analyzing amplifyand-forward and decode-and-forward cooperative strategies in Wyner's channel model
-
P. Zhang, J. Yuan, J. Chen, J. Wang, and J. Yang, "Analyzing amplifyand-forward and decode-and-forward cooperative strategies in Wyner's channel model," in Proc. IEEE Wireless Communications & Networking Conference (WCNC), Budapest, Hungary, 2009.
-
Proc. IEEE Wireless Communications & Networking Conference (WCNC), Budapest, Hungary, 2009
-
-
Zhang, P.1
Yuan, J.2
Chen, J.3
Wang, J.4
Yang, J.5
-
7
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
L. Dong, Z. Han, A. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. on Signal Proc., vol. 58, pp. 1875-1888, 2010.
-
(2010)
IEEE Trans. on Signal Proc.
, vol.58
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.3
Poor, H.V.4
-
8
-
-
79959299435
-
Optimal cooperative relaying schemes for improving wireless physical layer security
-
Under review
-
J. Li, A. P. Petropulu, and S. Weber, "Optimal cooperative relaying schemes for improving wireless physical layer security," IEEE Trans. on Info. Th., 2010, Under review.
-
(2010)
IEEE Trans. on Info. Th.
-
-
Li, J.1
Petropulu, A.P.2
Weber, S.3
-
9
-
-
79959288860
-
Outage performances for amplify-and-forward, decode-and-forward and cooperative jamming strategies for the wiretap channel
-
F. Gabry, R. Thobaben, and M. Skoglund, "Outage performances for amplify-and-forward, decode-and-forward and cooperative jamming strategies for the wiretap channel," in Proc. IEEE Wireless Communications & Networking Conference (WCNC), Mexico, 2011.
-
Proc. IEEE Wireless Communications & Networking Conference (WCNC), Mexico, 2011
-
-
Gabry, F.1
Thobaben, R.2
Skoglund, M.3
-
10
-
-
77955397265
-
Friendly jamming for wireless secrecy
-
M. Bloch, J. Barros, J.P. Vilela, and S. W. McLaughlin, "Friendly jamming for wireless secrecy," in Proc. IEEE International Conference on Communications (ICC), Cape Town, South Africa, 2010.
-
Proc. IEEE International Conference on Communications (ICC), Cape Town, South Africa, 2010
-
-
Bloch, M.1
Barros, J.2
Vilela, J.P.3
McLaughlin, S.W.4
|