-
1
-
-
79551634548
-
Physical layer security for two way relay communications with friendly jammers
-
Miami, FL, Dec.
-
R. Zhang, L. Song, Z. Han, B. Jiao, and M. Debbah, "Physical layer security for two way relay communications with friendly jammers," in Proc. IEEE Global Commun. Conf., Miami, FL, Dec. 2010, pp. 1-6.
-
(2010)
Proc. IEEE Global Commun. Conf.
, pp. 1-6
-
-
Zhang, R.1
Song, L.2
Han, Z.3
Jiao, B.4
Debbah, M.5
-
2
-
-
0016562514
-
The wire-tap channel
-
Oct
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
3
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
4
-
-
0017996501
-
The Gaussian wire- tap channel
-
Jul
-
S. K. Leung-Yan-Cheong and M. E. Hellman, "The Gaussian wire- tap channel," IEEE Trans. Inf. Theory, vol. IT-24, no. 4, pp. 451-456, Jul. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.K.1
Hellman, M.E.2
-
5
-
-
39049144353
-
Secrecy capacity of wireless channels
-
DOI 10.1109/ISIT.2006.261613, 4035982, Proceedings - 2006 IEEE International Symposium on Information Theory, ISIT 2006
-
J. Barros and M. R. D. Rodrigues, "Secrecy capacity of wireless channels," in Proc. IEEE Int. Symp. Inf. Theory, Seattle, WA, Jul. 2006, pp. 356-360. (Pubitemid 351244113)
-
(2006)
IEEE International Symposium on Information Theory - Proceedings
, pp. 356-360
-
-
Barros, J.1
Rodrigues, M.R.D.2
-
6
-
-
64549128283
-
Secure wireless com- munications via cooperation
-
Control, Computing/UIUC, Monticello, IL, Sep.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Secure wireless com- munications via cooperation," in Proc. 46th Annu. Allerton Conf. Com- mun., Control, Computing/UIUC, Monticello, IL, Sep. 2008, pp. 1132- 1138.
-
(2008)
Proc. 46th Annu. Allerton Conf. Com- Mun.
, pp. 1132-1138
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
7
-
-
70349218031
-
Amplify-and-forward based cooperation for secure wireless communications
-
Taipei, Taiwan, Apr.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Amplify-and- forward based cooperation for secure wireless communications," in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process., Taipei, Taiwan, Apr. 2009, pp. 2613-2616.
-
(2009)
Proc. IEEE Int. Conf. Acoust., Speech, Signal Process.
, pp. 2613-2616
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
8
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
9
-
-
45249101530
-
The general Gaussian multiple-access and two- way wiretap channels: Achievable rates and cooperativejamming
-
Jun
-
E. Tekin and A. Yener, "The general Gaussian multiple-access and two- way wiretap channels: Achievable rates and cooperativejamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
10
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
Sep
-
L. Lai and H. E. Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.9
, pp. 4005-4019
-
-
Lai, L.1
Gamal, H.E.2
-
11
-
-
79951618084
-
Optimal cooperativejamming to enhance physical layer security using relays
-
Mar
-
G. Zheng, L.-C. Choo, and K.-K. Wong, "Optimal cooperativejamming to enhance physical layer security using relays," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317-1322, Mar. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.3
, pp. 1317-1322
-
-
Zheng, G.1
Choo, L.-C.2
Wong, K.-K.3
-
12
-
-
79960596603
-
Improve physical layer security in cooperative wireless network using distributed auction games
-
Shanghai, China, Apr.
-
R. Zhang, L. Song, Z. Han, and B. Jiao, "Improve physical layer security in cooperative wireless network using distributed auction games," in Proc. IEEE INFOCOM Workshop Cognit. Cooperative Netw., Shanghai, China, Apr. 2011, pp. 18-23.
-
(2011)
Proc. IEEE INFOCOM Workshop Cognit. Cooperative Netw.
, pp. 18-23
-
-
Zhang, R.1
Song, L.2
Han, Z.3
Jiao, B.4
-
13
-
-
70350583050
-
Relay selection for secure cooperative networks with jamming
-
Oct
-
I. Krikidis, J. S. Thompson, and S. McLaughlin, "Relay selection for secure cooperative networks with jamming," IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5003-5011, Oct. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.10
, pp. 5003-5011
-
-
Krikidis, I.1
Thompson, J.S.2
McLaughlin, S.3
-
14
-
-
84862963131
-
Joint relay andjammer selection for secure two-way relay networks
-
Feb
-
J. Chen, R. Zhang, L. Song, Z. Han, and B. Jiao, "Joint relay andjammer selection for secure two-way relay networks," IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 310-320, Feb. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.1
, pp. 310-320
-
-
Chen, J.1
Zhang, R.2
Song, L.3
Han, Z.4
Jiao, B.5
-
15
-
-
84938932265
-
Coding for relay channels with confidential messages
-
Cairns, Australia, Sep.
-
Y. Oohama, "Coding for relay channels with confidential messages," in Proc. IEEE Inf. Theory Workshop, Cairns, Australia, Sep. 2001, pp. 87-89.
-
(2001)
Proc. IEEE Inf. Theory Workshop
, pp. 87-89
-
-
Oohama, Y.1
-
16
-
-
51649095674
-
Capacity theorems for relay channels with confidential mes- sages
-
Nice, France, Jun.
-
Y. Oohama, "Capacity theorems for relay channels with confidential mes- sages," in Proc. IEEE Int. Symp. Inf. Theory, Nice, France, Jun. 2007, pp. 926-930.
-
(2007)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 926-930
-
-
Oohama, Y.1
-
17
-
-
77954584734
-
Cooperation with an untrusted relay: A secrecy perspective
-
Aug
-
X. He and A. Yener, "Cooperation with an untrusted relay: A secrecy perspective," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3807-3827, Aug. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.8
, pp. 3807-3827
-
-
He, X.1
Yener, A.2
-
18
-
-
67249087217
-
Two-hop secure communication using an untrusted relay: A case for cooperative jamming
-
New Orleans, LA, Dec.
-
X. He and A. Yener, "Two-hop secure communication using an untrusted relay: A case for cooperative jamming," in Proc. IEEE Global Commun. Conf., New Orleans, LA, Dec. 2008, pp. 1-5.
-
(2008)
Proc. IEEE Global Commun. Conf.
, pp. 1-5
-
-
He, X.1
Yener, A.2
-
19
-
-
39049114596
-
Achievable rate regions for the two-way relay channel
-
DOI 10.1109/ISIT.2006.261638, 4036251, Proceedings - 2006 IEEE International Symposium on Information Theory, ISIT 2006
-
B. Rankov and A. Wittneben, "Achievable rate regions for the two- way relay channel," in Proc. IEEE Int. Symp. Inf. Theory, Seattle, WA, Jul. 2006, pp. 1668-1672. (Pubitemid 351244382)
-
(2006)
IEEE International Symposium on Information Theory - Proceedings
, pp. 1668-1672
-
-
Rankov, B.1
Wittneben, A.2
-
20
-
-
33847736358
-
Spectral efficient protocols for half-duplex fading relay channels
-
DOI 10.1109/JSAC.2007.070213
-
B. Rankov and A. Wittneben, "Spectral efficient protocols for half-duplex fading relay channels," IEEE J. Sel. Areas Commun., vol. 25, no. 2, pp. 379-389, Feb. 2007. (Pubitemid 46376100)
-
(2007)
IEEE Journal on Selected Areas in Communications
, vol.25
, Issue.2
, pp. 379-389
-
-
Rankov, B.1
Wittneben, A.2
-
21
-
-
70350584562
-
Memoryless relay strategies for two-way relay channels
-
Oct
-
T. Cui, T. Ho, and J. Kliewer, "Memoryless relay strategies for two-way relay channels," IEEE Trans. Commun., vol. 57, no. 10, pp. 3132-3143, Oct. 2009.
-
(2009)
IEEE Trans. Commun.
, vol.57
, Issue.10
, pp. 3132-3143
-
-
Cui, T.1
Ho, T.2
Kliewer, J.3
-
23
-
-
79959295724
-
-
Cambridge, U.K.: Cambridge Univ. Press
-
Z. Han, D. Niyato, W. Saad, T. Basar, and A. Hjørungnes, Game Theory in Wireless and Communication Networks: Theory, Models and Applications. Cambridge, U.K.: Cambridge Univ. Press, 2010.
-
(2010)
Game Theory in Wireless and Communication Networks: Theory, Models and Applications
-
-
Han, Z.1
Niyato, D.2
Saad, W.3
Basar, T.4
Hjørungnes, A.5
-
24
-
-
50649118336
-
Game theory in communication systems
-
Sep
-
J. Huang, D. P. Palomar, N. B. Mandayam, S. B. Wicker, J. Walrand, and T. Basar, "Game theory in communication systems," IEEE J. Sel. Areas Commun., vol. 26, no. 7, pp. 1042-1046, Sep. 2008.
-
(2008)
IEEE J. Sel. Areas Commun.
, vol.26
, Issue.7
, pp. 1042-1046
-
-
Huang, J.1
Palomar, D.P.2
Mandayam, N.B.3
Wicker, S.B.4
Walrand, J.5
Basar, T.6
-
25
-
-
85032752175
-
Game theory in signal processing and communications
-
Sep
-
E. A. Jorswieck, E. G. Larsson, M. Luise, and H. V. Poor, "Game theory in signal processing and communications," IEEE Signal Process. Mag., vol. 26, no. 5, p. 17, Sep. 2009.
-
(2009)
IEEE Signal Process. Mag.
, vol.26
, Issue.5
, pp. 17
-
-
Jorswieck, E.A.1
Larsson, E.G.2
Luise, M.3
Poor, H.V.4
-
26
-
-
76649135514
-
Physical layer security game: Interaction between source, eavesdropper and friendly jammer
-
Mar.
-
Z. Han, N. Marina, M. Debbah, and A. Hjørungnes, "Physical layer security game: Interaction between source, eavesdropper and friendly jammer," EURASIP J. Wireless Commun. Netw., vol. 2009, pp. 452907- 1-452907-10, Mar. 2009.
-
(2009)
EURASIP J. Wireless Commun. Netw.
, vol.2009
, pp. 452907-452901
-
-
Han, Z.1
Marina, N.2
Debbah, M.3
Hjørungnes, A.4
-
27
-
-
70349991516
-
Physical layer security game: How to date a girl with her boyfriend on the same table
-
Istanbul, Turkey, May
-
Z. Han, N. Marina, M. Debbah, and A. Hjørungnes, "Physical layer security game: How to date a girl with her boyfriend on the same table," in Proc. IEEE Int. Conf. Game Theory Netw., Istanbul, Turkey, May 2009, pp. 287-294.
-
(2009)
Proc. IEEE Int. Conf. Game Theory Netw.
, pp. 287-294
-
-
Han, Z.1
Marina, N.2
Debbah, M.3
Hjørungnes, A.4
-
28
-
-
0003579258
-
-
Cambridge U.K.: Cambridge Univ. Press
-
S. Verdú, Multiuser Detection. Cambridge, U.K.: Cambridge Univ. Press, 1998.
-
(1998)
Multiuser Detection
-
-
Verdú, S.1
-
29
-
-
0018454402
-
Nonclassical control problems and stackelberg games
-
G. Papavassilopoulos and J. Cruz, "Nonclassical control problems and Stackelberg games," IEEE Trans. Autom. Control, vol. AC-24, no. 2, pp. 155-166, Apr. 1979. (Pubitemid 9446093)
-
(1979)
IEEE Trans Autom Control
, vol.AC-24
, Issue.2
, pp. 155-166
-
-
Papavassilopoulos, G.1
Cruz Jr. Jose, B.2
-
30
-
-
84924437865
-
-
Cambridge, U.K.: Cambridge Univ. Press
-
Z. Han and K. J. R. Liu, Resource Allocationfor Wireless Networks: Basics, Techniques, andApplications. Cambridge, U.K.: Cambridge Univ. Press, 2008.
-
(2008)
Resource Allocationfor Wireless Networks: Basics, Techniques, AndApplications
-
-
Han, Z.1
Liu, K.J.R.2
-
31
-
-
0029375832
-
A framework for uplink power control in cellular radio sys- tems
-
Sep
-
R. Yates, "A framework for uplink power control in cellular radio sys- tems," IEEE J. Sel. Areas Commun., vol. 13, no. 7, pp. 1341-1347, Sep. 1995.
-
(1995)
IEEE J. Sel. Areas Commun.
, vol.13
, Issue.7
, pp. 1341-1347
-
-
Yates, R.1
-
32
-
-
50649105039
-
Non-atomic games for multi-user systems
-
Sep
-
N. Bonneau, M. Debbah, E. Altman, and A. Hjrungnes, "Non-atomic games for multi-user systems," IEEE J. Sel. Areas Commun., vol. 26, no. 7, pp. 1047-1058, Sep. 2008.
-
(2008)
IEEE J. Sel. Areas Commun.
, vol.26
, Issue.7
, pp. 1047-1058
-
-
Bonneau, N.1
Debbah, M.2
Altman, E.3
Hjrungnes, A.4
-
34
-
-
4143131984
-
Cooperative syn- chronization and channel estimation in wireless sensor networks
-
Pacific Grove, CA, Nov.
-
M.-K. Oh, X. Ma, G. Giannakis, and D.-J. Park, "Cooperative syn- chronization and channel estimation in wireless sensor networks," in Proc. 37th Asilomar Conf. Signals, Syst. Comput., Pacific Grove, CA, Nov. 2003, pp. 238-242.
-
(2003)
Proc. 37th Asilomar Conf. Signals, Syst. Comput.
, pp. 238-242
-
-
Oh, M.-K.1
Ma, X.2
Giannakis, G.3
Park, D.-J.4
-
35
-
-
77953738244
-
Practical timing and frequency synchronization for OFDM-based cooperative systems
-
Jul
-
Q. Huang, M. Ghogho, J. Wei, and P. Ciblat, "Practical timing and frequency synchronization for OFDM-based cooperative systems," IEEE Trans. Signal Process., vol. 58, no. 7, pp. 3706-3716, Jul. 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.7
, pp. 3706-3716
-
-
Huang, Q.1
Ghogho, M.2
Wei, J.3
Ciblat, P.4
|