-
1
-
-
54849430727
-
Identity-based key management in mobile ad hoc networks: Techniques and applications
-
Oct.
-
E. D. Silva, A. L. D. Santos, L. C. P. Albini, and M. Lima, "Identity-based key management in mobile ad hoc networks: techniques and applications,"IEEE Wireless Communication, vol. 15, pp. 46-52, Oct. 2008.
-
(2008)
IEEE Wireless Communication
, vol.15
, pp. 46-52
-
-
Silva, E.D.1
Santos, A.L.D.2
Albini, L.C.P.3
Lima, M.4
-
2
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. D. Wyner, "The wire-tap channel," Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell System Technical Journal
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
3
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages,"IEEE Transactions on Information Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Transactions on Information Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
4
-
-
45249119255
-
Secure communication over fading channels
-
Shitz Jun.
-
Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Secure communication over fading channels," IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 2470-2492, Jun. 2008.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.6
, pp. 2470-2492
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
5
-
-
64549128283
-
Secure wireless communications via cooperation
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Secure wireless communications via cooperation," in Proceedings of 46th Annual Allerton Conference on Communication, Control, and Computing, UIUC, Illinois, USA, Sep. 2008.
-
Proceedings of 46th Annual Allerton Conference on Communication, Control, and Computing, UIUC, Illinois, USA, Sep. 2008
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
6
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
Sep.
-
L. Lai and H. E. Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Transactions on Information Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.9
, pp. 4005-4019
-
-
Lai, L.1
Gamal, H.E.2
-
9
-
-
70350583050
-
Relay selection for secure cooperative networks with jamming
-
Oct.
-
I. Krikidis, J. Thompson, and S. Mclaughlin,"Relay selection for secure cooperative networks with jamming," IEEE Transactions on Wireless Communications, vol. 8, no. 10, pp. 5003-5011, Oct. 2009.
-
(2009)
IEEE Transactions on Wireless Communications
, vol.8
, Issue.10
, pp. 5003-5011
-
-
Krikidis, I.1
Thompson, J.2
Mclaughlin, S.3
-
10
-
-
39049114596
-
Achievable rate regions for the twoway relay channel
-
B. Rankov and A. Wittneben, "Achievable rate regions for the twoway relay channel," in Proceedings of IEEE International Symposium on Information Theory, Seattle, USA, Jul. 2006.
-
Proceedings of IEEE International Symposium on Information Theory, Seattle, USA, Jul. 2006
-
-
Rankov, B.1
Wittneben, A.2
-
11
-
-
33947617858
-
Wireless network coding by amplify-and-forward for bi-directional traffic flows
-
DOI 10.1109/LCOMM.2007.061436
-
P. Popovski and H. Yomo, "Wireless network coding by amplify-and-forward for bi-directional traffic flows," IEEE Communications Letters, vol. 11, no. 1, pp. 16-18, Jan. 2007. (Pubitemid 46501839)
-
(2007)
IEEE Communications Letters
, vol.11
, Issue.1
, pp. 16-18
-
-
Popovski, P.1
Yomo, H.2
-
13
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Transactions on Signal Processing, vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Transactions on Signal Processing
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
|