-
1
-
-
0345258506
-
User cooperation diversity - Part I: System description
-
Nov.
-
A. Sendonaris, E. Erkip, and B. Aazhang, "User cooperation diversity - Part I: System description," IEEE Trans. Commun., vol. 51, no. 11, pp. 1927-1938, Nov. 2003.
-
(2003)
IEEE Trans. Commun.
, vol.51
, Issue.11
, pp. 1927-1938
-
-
Sendonaris, A.1
Erkip, E.2
Aazhang, B.3
-
2
-
-
5044252003
-
Cooperative diversity in wireless networks: Efficient protocols and outage behavior
-
Dec.
-
J. N. Laneman, D. N. C. Tse, and G. W. Wornell, "Cooperative diversity in wireless networks: efficient protocols and outage behavior," IEEE Trans. Inform. Theory, vol. 50, no. 12, Dec. 2004.
-
(2004)
IEEE Trans. Inform. Theory
, vol.50
, Issue.12
-
-
Laneman, J.N.1
Tse, D.N.C.2
Wornell, G.W.3
-
3
-
-
85032752478
-
Cooperative communications in resource-constrained wireless networks
-
May
-
Y.-W. Hong, W.-J. Huang, F.-H. Chiu, and C.-C. J. Kuo, "Cooperative communications in resource-constrained wireless networks," IEEE Signal Processing Mag., vol. 24, no. 3, pp. 47-57, May 2007.
-
(2007)
IEEE Signal Processing Mag.
, vol.24
, Issue.3
, pp. 47-57
-
-
Hong, Y.-W.1
Huang, W.-J.2
Chiu, F.-H.3
Kuo, J.C.-C.4
-
4
-
-
33947700283
-
Security issues in cooperative communications: Tracing adversarial relays
-
Y. Mao and M. Wu, "Security issues in cooperative communications: Tracing adversarial relays," in Proceedings of the IEEE ICASSP, pp. IV69-IV72, 2006.
-
(2006)
Proceedings of the IEEE ICASSP
-
-
Mao, Y.1
Wu, M.2
-
5
-
-
34249313010
-
Tracing malicious relays in cooperative wireless communications
-
Jun.
-
Y. Mao and M. Wu, "Tracing malicious relays in cooperative wireless communications," in IEEE Trans. on Information Forensics and Security, vol. 2, no. 2, pp. 198-212, Jun. 2007.
-
(2007)
IEEE Trans. on Information Forensics and Security
, vol.2
, Issue.2
, pp. 198-212
-
-
Mao, Y.1
Wu, M.2
-
7
-
-
51849100767
-
Cooperative diversity in the presence of misbehaving relay: Performance analysis
-
S. Dehnie, H. Sencar, and N. Memon, "Cooperative diversity in the presence of misbehaving relay: Performance analysis," in IEEE Sarnoff Symposium, 2007.
-
(2007)
IEEE Sarnoff Symposium
-
-
Dehnie, S.1
Sencar, H.2
Memon, N.3
-
8
-
-
44049108259
-
Detecting malicious behavior in cooperative diversity
-
S. Dehnie, H. Sencar, and N. Memon, "Detecting malicious behavior in cooperative diversity," in Proceedings of the Conference on Information Science and Systems (CISS), pp. 895-899, 2007.
-
(2007)
Proceedings of the Conference on Information Science and Systems (CISS)
, pp. 895-899
-
-
Dehnie, S.1
Sencar, H.2
Memon, N.3
-
9
-
-
78349287391
-
Two tier detection model for misbehavior of low-power nodes in virtual MIMO based wireless networks
-
Aug.
-
Y. Liu, Y. Wu, and J. Tang, "Two tier detection model for misbehavior of low-power nodes in virtual MIMO based wireless networks," in Proceeding of IEEE International Conference on Information Assurance and Security (IAS), pp. 155-160, Aug. 2010.
-
(2010)
Proceeding of IEEE International Conference on Information Assurance and Security (IAS)
, pp. 155-160
-
-
Liu, Y.1
Wu, Y.2
Tang, J.3
-
10
-
-
79951599667
-
Trust establishment in cooperative wireless networks
-
Nov.
-
R. Changiz, H. Halabian, F. R. Yu, I. Lambadaris, H. Tang, and P. C. Mason, "Trust establishment in cooperative wireless networks," in Proceeding of IEEE Military Communications Conference (MILCOM), pp. 1074-1079, Nov. 2010.
-
(2010)
Proceeding of IEEE Military Communications Conference (MILCOM)
, pp. 1074-1079
-
-
Changiz, R.1
Halabian, H.2
Yu, F.R.3
Lambadaris, I.4
Tang, H.5
Mason, P.C.6
|