메뉴 건너뛰기




Volumn , Issue , 2011, Pages

Jammer selection policies for secure wireless networks

Author keywords

[No Author keywords available]

Indexed keywords

JAMMERS; PACKET COLLISIONS; SECURE WIRELESS NETWORK; STOCHASTIC NETWORK MODELS;

EID: 80051986656     PISSN: 05361486     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/iccw.2011.5963525     Document Type: Conference Paper
Times cited : (8)

References (17)
  • 1
    • 0345258506 scopus 로고    scopus 로고
    • User cooperation diversity - Part I: System description
    • a. sendonaris, e. erkip, AND b. aazhang, "user cooperation diversity - Part I: System description," ieee transactions on communications, vol. 51, no. 11, pp. 1927-1938, 2003.
    • (2003) Ieee Transactions on Communications , vol.51 , Issue.11 , pp. 1927-1938
    • Sendonaris, A.1    Erkip, E.2    Aazhang, B.3
  • 2
    • 5044252003 scopus 로고    scopus 로고
    • Cooperative diversity in wireless networks: Efficient protocols and outage behavior
    • J. N. Laneman, D. N. C. Tse, and G. W. Wornell, "Cooperative diversity in wireless networks: Efficient protocols and outage behavior," IEEE Transactions on Information Theory, vol. 50, no. 12, pp. 3062-3080, 2004.
    • (2004) IEEE Transactions on Information Theory , vol.50 , Issue.12 , pp. 3062-3080
    • Laneman, J.N.1    Tse, D.N.C.2    Wornell, G.W.3
  • 4
    • 45849133457 scopus 로고    scopus 로고
    • Guaranteeing secrecy using artificial noise
    • S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Transactions on Wireless Communications, vol. 7, no. 6, pp. 2180-2189, 2008.
    • (2008) IEEE Transactions on Wireless Communications , vol.7 , Issue.6 , pp. 2180-2189
    • Goel, S.1    Negi, R.2
  • 5
    • 45249101530 scopus 로고    scopus 로고
    • The General Gaussian Multiple-Access and Two-Way Wire-Tap Channels: Achievable Rates and Cooperative Jamming
    • June
    • E. Tekin and A. Yener, "The General Gaussian Multiple-Access and Two-Way Wire-Tap Channels: Achievable Rates and Cooperative Jamming,"IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 2735-2751, June 2008.
    • (2008) IEEE Transactions on Information Theory , vol.54 , Issue.6 , pp. 2735-2751
    • Tekin, E.1    Yener, A.2
  • 6
    • 51349109773 scopus 로고    scopus 로고
    • The relay-eavesdropper channel: Cooperation for secrecy
    • L. Lai and H. E. Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Transactions on Information Theory, vol. 54, no. 9, pp. 4005-4019, 2008.
    • (2008) IEEE Transactions on Information Theory , vol.54 , Issue.9 , pp. 4005-4019
    • Lai, L.1    Gamal, H.E.2
  • 9
    • 40949147785 scopus 로고    scopus 로고
    • Multiple-access channels with confidential messages
    • Y. Liang and H. V. Poor, "Multiple-access channels with confidential messages," IEEE Transactions on Information Theory, vol. 54, no. 3, pp. 976-1002, 2008.
    • (2008) IEEE Transactions on Information Theory , vol.54 , Issue.3 , pp. 976-1002
    • Liang, Y.1    Poor, H.V.2
  • 10
    • 57349093480 scopus 로고    scopus 로고
    • The gaussian multiple access wire-tap channel
    • E. Tekin and A. Yener, "The gaussian multiple access wire-tap channel,"IEEE Transactions on Information Theory, vol. 54, no. 12, pp. 5747-5755, 2008.
    • (2008) IEEE Transactions on Information Theory , vol.54 , Issue.12 , pp. 5747-5755
    • Tekin, E.1    Yener, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.