-
1
-
-
68349116049
-
Information theoretic security
-
Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Information theoretic security," Foundations and Trends in Communications and Information Theory, vol. 5, no. 4-5, pp. 355-580, 2008.
-
(2008)
Foundations and Trends in Communications and Information Theory
, vol.5
, Issue.4-5
, pp. 355-580
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
4
-
-
70350583050
-
Relay selection for secure cooperative networks with jamming
-
Oct.
-
I. Krikidis, J. Thompson, and S. Mclaughlin, "Relay selection for secure cooperative networks with jamming," IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5003-5011, Oct. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.10
, pp. 5003-5011
-
-
Krikidis, I.1
Thompson, J.2
McLaughlin, S.3
-
5
-
-
85027929481
-
Opportunistic relaying for secrecy communications: Cooperative jamming vs. relay chatting
-
Jun.
-
Z. Ding, K. K. Leung, D. L. Goeckel, and D. Towsley, "Opportunistic relaying for secrecy communications: Cooperative jamming vs. relay chatting," IEEE Trans. Wireless Commun., vol. 10, no. 6, pp. 1725-1729, Jun. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.6
, pp. 1725-1729
-
-
Ding, Z.1
Leung, K.K.2
Goeckel, D.L.3
Towsley, D.4
-
6
-
-
84938932265
-
Coding for relay channels with confidential messages
-
Sep.
-
Y. Oohama, "Coding for relay channels with confidential messages," in Proc. IEEE Information Theory Workshop, Sep. 2001, pp. 87-89.
-
(2001)
Proc. IEEE Information Theory Workshop
, pp. 87-89
-
-
Oohama, Y.1
-
7
-
-
77954584734
-
Cooperation with an untrusted relay: A secrecy perspective
-
Jul.
-
X. He and A. Yener, "Cooperation with an untrusted relay: A secrecy perspective," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3807-3827, Jul. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.8
, pp. 3807-3827
-
-
He, X.1
Yener, A.2
-
8
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
Jun.
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
9
-
-
80052889357
-
Cooperative jamming for secure communications in MIMO relay networks
-
Oct.
-
J. Huang and A. L. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 4871-4884
-
-
Huang, J.1
Swindlehurst, A.L.2
-
10
-
-
84863359764
-
Robust secure transmission in MISO channels based on worst-case optimization
-
to appear
-
J. Huang and A. Swindlehurst, "Robust secure transmission in MISO channels based on worst-case optimization," IEEE Trans. Signal Process., 2012, to appear.
-
(2012)
IEEE Trans. Signal Process.
-
-
Huang, J.1
Swindlehurst, A.2
-
11
-
-
0003498504
-
-
7th ed. San Diego, CA Academic Press
-
I. S. Gradshteyn and I. M. Ryzhik, Tables of Integrals, Series, and Products, 7th ed. San Diego, CA: Academic Press, 2007.
-
(2007)
Tables of Integrals, Series, and Products
-
-
Gradshteyn, I.S.1
Ryzhik, I.M.2
-
12
-
-
35448931484
-
Cooperative communications with outage-optimal opportunistic relaying
-
Sep.
-
A. Bletsas, H. Shin, and M. Z. Win, "Cooperative communications with outage-optimal opportunistic relaying," IEEE Trans. Wireless Commun., vol. 6, no. 9, pp. 3450-3460, Sep. 2007.
-
(2007)
IEEE Trans. Wireless Commun.
, vol.6
, Issue.9
, pp. 3450-3460
-
-
Bletsas, A.1
Shin, H.2
Win, M.Z.3
|