-
1
-
-
84890522850
-
Communication theory of secrecy systems
-
Oct.
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 656-715, Oct. 1949.
-
(1949)
Bell Syst. Tech. J.
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
2
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, "The wire-tap channel," Bell Sys. Tech. J., vol. 54, pp. 1355-1387, 1975.
-
(1975)
Bell Sys. Tech. J.
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
-
3
-
-
0017996501
-
The Gaussian wire-tap channel
-
July
-
S. L. Y. Cheong and M. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, July 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Cheong, S.L.Y.1
Hellman, M.2
-
4
-
-
77953802876
-
Secure transmission with multiple antennas I: The MISOME wiretap channel
-
July
-
A. Khisti and G. Wornell, "Secure transmission with multiple antennas I: the MISOME wiretap channel", IEEE Trans. Inform. Theory, vol. 56, no. 7, pp. 3088-3104, July 2010.
-
(2010)
IEEE Trans. Inform. Theory
, vol.56
, Issue.7
, pp. 3088-3104
-
-
Khisti, A.1
Wornell, G.2
-
5
-
-
51649117832
-
On the Gaussian MIMO wiretap channel
-
Nice, France, June
-
A. Khisti, G. Wornell, A. Wiesel, and Y. Eldar, "On the Gaussian MIMO wiretap channel," in Proc. IEEE ISIT, Nice, France, pp. 2471-2475, June 2007.
-
(2007)
Proc. IEEE ISIT
, pp. 2471-2475
-
-
Khisti, A.1
Wornell, G.2
Wiesel, A.3
Eldar, Y.4
-
6
-
-
52349090496
-
The secrecy capacity of the MIMO wiretap channel
-
Toronto, Canada, July
-
F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," in Proc. IEEE ISIT, Toronto, Canada, pp. 524-528, July 2008.
-
(2008)
Proc. IEEE ISIT
, pp. 524-528
-
-
Oggier, F.1
Hassibi, B.2
-
7
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
June
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, June 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
8
-
-
77955026667
-
Collaborative relay beamforming for secure broadcasting
-
Princeton, NJ, Apr.
-
J. Zhang, M. C. Gursoy, "Collaborative relay beamforming for secure broadcasting," in Proc. IEEE WCNC, pp.1-6, Princeton, NJ, Apr. 2010.
-
(2010)
Proc. IEEE WCNC
, pp. 1-6
-
-
Zhang, J.1
Gursoy, M.C.2
-
9
-
-
77953707901
-
Relay beamforming strategies for physicallayer security
-
Syndeney, Australia, Mar.
-
J. Zhang, M. C. Gursoy, "Relay beamforming strategies for physicallayer security," in Proc. CISS, pp.1-6, Syndeney, Australia, Mar. 2010.
-
(2010)
Proc. CISS
, pp. 1-6
-
-
Zhang, J.1
Gursoy, M.C.2
-
10
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
11
-
-
77955397265
-
Friendly jamming for wireless secrecy
-
Cape Town, South Africa
-
M. Bloch, J. Barros, J. P. Vilela, and S. W. McLaughlin, "Friendly jamming for wireless secrecy," in IEEE International Conference on Communications (ICC), Cape Town, South Africa, 2010.
-
(2010)
IEEE International Conference on Communications (ICC)
-
-
Bloch, M.1
Barros, J.2
Vilela, J.P.3
McLaughlin, S.W.4
-
12
-
-
70350583050
-
Relay selection for secure cooperative networks with jamming
-
Oct.
-
I. Krikidis, J. Thompson, S. Mclaughlin, "Relay selection for secure cooperative networks with jamming," IEEE Trans. Wireless Commun., vol.8, no.10, pp.5003-5011, Oct. 2009
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.10
, pp. 5003-5011
-
-
Krikidis, I.1
Thompson, J.2
McLaughlin, S.3
-
13
-
-
79951618084
-
Optimal cooperative jamming to enhance physical layer security using relays
-
Mar.
-
G. Zheng, L.-C. Choo, K.-K. Wong, "Optimal cooperative jamming to enhance physical layer security using relays," IEEE Trans. Signal Process., vol.59, no.3, pp.1317-1322, Mar. 2011
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.3
, pp. 1317-1322
-
-
Zheng, G.1
Choo, L.-C.2
Wong, K.-K.3
-
14
-
-
80052889357
-
Cooperative jamming for secure communications in MIMO relay networks
-
Oct.
-
J. Huang, A. L. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Trans. Signal Process., vol.59, no.10, pp.4871-4884, Oct. 2011
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 4871-4884
-
-
Huang, J.1
Swindlehurst, A.L.2
-
15
-
-
67650587787
-
Optimal beamforming for two-way multi-antenna relay channel with analogue network coding
-
Jun.
-
R. Zhang, Y.-C. Liang, C. C. Chai, S. Cui, "Optimal beamforming for two-way multi-antenna relay channel with analogue network coding," IEEE J. Sel. Areas Commun., vol. 27, no. 5, pp. 699-712, Jun. 2009.
-
(2009)
IEEE J. Sel. Areas Commun.
, vol.27
, Issue.5
, pp. 699-712
-
-
Zhang, R.1
Liang, Y.-C.2
Chai, C.C.3
Cui, S.4
-
16
-
-
45249101530
-
The general Gaussian multiple access and twoway wire-tap channels: Achievable rates and cooperative jamming
-
June
-
E. Tekin and A. Yener, "The general Gaussian multiple access and twoway wire-tap channels: achievable rates and cooperative jamming," IEEE Trans. Inform. Theory, vol. 54, no. 6, pp. 2735-2751, June 2008.
-
(2008)
IEEE Trans. Inform. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
17
-
-
78751521977
-
Securing multi-antenna two-way relay channels with analog network coding against eavesdroppers
-
Jun.
-
A. Mukherjee and A. L. Swindlehurst, "Securing multi-antenna two-way relay channels with analog network coding against eavesdroppers," in Proc. 11th IEEE SPAWC, Jun. 2010.
-
(2010)
Proc. 11th IEEE SPAWC
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
18
-
-
84862635573
-
Distributed beamforming for physical-layer security of two-way relay networks
-
Jul.
-
H.-M. Wang, Q. Yin, and X.-G. Xia, "Distributed beamforming for physical-layer security of two-way relay networks, " IEEE Trans. Signal Process., vol.60, no.7, pp.3532-3545, Jul. 2012.
-
(2012)
IEEE Trans. Signal Process.
, vol.60
, Issue.7
, pp. 3532-3545
-
-
Wang, H.-M.1
Yin, Q.2
Xia, X.-G.3
-
19
-
-
80052165426
-
Joint relay and Jammer selection for secure two-way relay networks
-
Jun.
-
J. Chen, R. Zhang, L. Song, et al, "Joint relay and jammer selection for secure two-way relay networks," in Proc. IEEE ICC, Jun. 2011.
-
(2011)
Proc. IEEE ICC
-
-
Chen, J.1
Zhang, R.2
Song, L.3
-
20
-
-
84863152970
-
Joint relay and jammer selection for secure decode-and-forward two-way relay communications
-
Houston, TX, Dec.
-
J. Chen, L. Song, Z. Han, et al, "Joint relay and jammer selection for secure decode-and-forward two-way relay communications," in Proc. GLOBECOM, Houston, TX, Dec. 2011.
-
(2011)
Proc. GLOBECOM
-
-
Chen, J.1
Song, L.2
Han, Z.3
|