-
1
-
-
68349116049
-
Information theoretic security
-
Y. Liang, H. V. Poor, and S. Shamai, "Information theoretic security," Found. Trends in Commun. Inf. Theory, vol. 5, no. 4-5, pp. 355-580, 2008.
-
(2008)
Found. Trends in Commun. Inf. Theory
, vol.5
, Issue.4-5
, pp. 355-580
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
2
-
-
45249104850
-
Wireless information-theoretic security
-
Jun
-
M. Bloch, J. Barros, M. Rodrigues, and S. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.3
McLaughlin, S.4
-
3
-
-
70350583050
-
Relay selection for secure cooperative networks with jamming
-
Oct
-
I. Krikidis, J. Thompson, and S. Mclaughlin, "Relay selection for secure cooperative networks with jamming," IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5003-5011, Oct. 2009.
-
(2009)
IEEE Trans. Wireless Commun
, vol.8
, Issue.10
, pp. 5003-5011
-
-
Krikidis, I.1
Thompson, J.2
McLaughlin, S.3
-
4
-
-
77957340850
-
Opportunistic relay selection for cooperative networks with secrecy constraints
-
Oct.
-
I. Krikidis, "Opportunistic relay selection for cooperative networks with secrecy constraints," IET Commun., vol. 4, no. 15, pp. 1787-1791, Oct. 2010.
-
(2010)
IET Commun
, vol.4
, Issue.15
, pp. 1787-1791
-
-
Krikidis, I.1
-
5
-
-
85027929481
-
Opportunistic relaying for secrecy communications: Cooperative jamming vs. relay chatting
-
Jun.
-
Z. Ding, K. K. Leung, D. L. Goeckel, and D. Towsley, "Opportunistic relaying for secrecy communications: Cooperative jamming vs. relay chatting," IEEE Trans. Wireless Commun., vol. 10, no. 6, pp. 1725-1729, Jun. 2011.
-
(2011)
IEEE Trans. Wireless Commun
, vol.10
, Issue.6
, pp. 1725-1729
-
-
Ding, Z.1
Leung, K.K.2
Goeckel, D.L.3
Towsley, D.4
-
6
-
-
84938932265
-
Coding for relay channels with confidential messages
-
Sep
-
Y. Oohama, "Coding for relay channels with confidential messages," in Proc. IEEE Inf. Theory Workshop, Sep. 2001, pp. 87-89.
-
(2001)
Proc. IEEE Inf. Theory Workshop
, pp. 87-89
-
-
Oohama, Y.1
-
7
-
-
76649123145
-
Two-hop secure communication using an untrusted relay
-
X. He and A. Yener, "Two-hop secure communication using an untrusted relay," EURASIP J. Wireless Commun. Netw., vol. 2009, pp. 1-13, 2009.
-
(2009)
EURASIP J. Wireless Commun. Netw
, vol.2009
, pp. 1-13
-
-
He, X.1
Yener, A.2
-
8
-
-
77954584734
-
Cooperation with an untrusted relay: A secrecy perspective
-
Jul.
-
X. He and A. Yener, "Cooperation with an untrusted relay: A secrecy perspective," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3807-3827, Jul. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.8
, pp. 3807-3827
-
-
He, X.1
Yener, A.2
-
9
-
-
84555190397
-
Joint secure beamforming design at the source and the relay for an amplify-and-forwardMIMOuntrusted relay system
-
Jan.
-
C. Jeong, I.-M.Kim, andD. I. Kim, "Joint secure beamforming design at the source and the relay for an amplify-and-forwardMIMOuntrusted relay system," IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310-325, Jan. 2012.
-
(2012)
IEEE Trans. Signal Process
, vol.60
, Issue.1
, pp. 310-325
-
-
Jeong, C.1
Kim, I.-M.2
Kim, D.I.3
-
10
-
-
79551634560
-
Feedback delay effect on dual-hop MIMOAF relayingwith antenna selection
-
Dec
-
G. Amarasuriya, C. Tellambura, and M. Ardakani, "Feedback delay effect on dual-hop MIMOAF relayingwith antenna selection," in Proc. IEEE Global Telecommun. Conf. (GLOBECOM), Dec. 2010, pp. 1-5.
-
(2010)
Proc. IEEE Global Telecommun. Conf. (GLOBECOM)
, pp. 1-5
-
-
Amarasuriya, G.1
Tellambura, C.2
Ardakani, M.3
-
11
-
-
77955712103
-
Near-optimal joint antenna selection for amplify-and-forward relay networks
-
Aug.
-
Y. Zhang, G. Zheng, C. Ji, K.-K. Wong, D. J. Edwards, and T. Cui, "Near-optimal joint antenna selection for amplify-and-forward relay networks," IEEE Trans. Wireless Commun., vol. 9, no. 8, pp. 2401-2407, Aug. 2010.
-
(2010)
IEEE Trans. Wireless Commun
, vol.9
, Issue.8
, pp. 2401-2407
-
-
Zhang, Y.1
Zheng, G.2
Ji, C.3
Wong, K.-K.4
Edwards, D.J.5
Cui, T.6
-
12
-
-
47049099974
-
End-to-end BER performance of cooperative MIMO transmission with antenna selection in Rayleigh fading
-
Oct
-
J.-B. Kim and D. Kim, "End-to-end BER performance of cooperative MIMO transmission with antenna selection in Rayleigh fading," in Proc. 40th Asilomar Conf. Signals, Syst. Comput., Oct. 2006, pp. 1654-1657.
-
(2006)
Proc. 40th Asilomar Conf. Signals, Syst. Comput
, pp. 1654-1657
-
-
Kim, J.-B.1
Kim, D.2
-
13
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
14
-
-
45249101530
-
The general gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming
-
Jun
-
E. Tekin and A. Yener, "The general gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
15
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
Jun
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
-
(2008)
IEEE Trans. Wireless Commun
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
16
-
-
80052889357
-
Cooperative jamming for secure communications in MIMO relay networks
-
Oct.
-
J. Huang and A. L. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.10
, pp. 4871-4884
-
-
Huang, J.1
Swindlehurst, A.L.2
-
17
-
-
84863359764
-
Robust secure transmission in MISO channels based on worst-case optimization
-
Apr.
-
J. Huang and A. L. Swindlehurst, "Robust secure transmission in MISO channels based on worst-case optimization," IEEE Trans. Signal Process., vol. 60, no. 4, pp. 1696-1707, Apr. 2012.
-
(2012)
IEEE Trans. Signal Process
, vol.60
, Issue.4
, pp. 1696-1707
-
-
Huang, J.1
Swindlehurst, A.L.2
-
18
-
-
79952706123
-
Rethinking the secrecy outage formulation: A secure transmission design perspective
-
Mar.
-
X. Zhou, M. R. McKay, B. Maham, and A. Hjørungnes, "Rethinking the secrecy outage formulation: A secure transmission design perspective," IEEE Commun. Lett., vol. 15, no. 3, pp. 302-304, Mar. 2011.
-
(2011)
IEEE Commun. Lett
, vol.15
, Issue.3
, pp. 302-304
-
-
Zhou, X.1
McKay, M.R.2
Maham, B.3
Hjørungnes, A.4
-
19
-
-
0003498504
-
-
New York: Academic
-
I. S. Gradshteyn and I.M. Ryzhik, Tables of Integrals, Series, Products, 7th ed. New York: Academic, 2007.
-
(2007)
Tables of Integrals, Series, Products, 7th ed
-
-
Gradshteyn, I.S.1
Ryzhik, I.M.2
-
20
-
-
4344559690
-
Fading relay channels: Performance limits and space-time signal design
-
Aug
-
R. Nabar, H. Bolcskei, and F. Kneubuhler, "Fading relay channels: Performance limits and space-time signal design," IEEE J. Sel. Areas Commun., vol. 22, no. 6, pp. 1099-1109, Aug. 2004.
-
(2004)
IEEE J. Sel. Areas Commun
, vol.22
, Issue.6
, pp. 1099-1109
-
-
Nabar, R.1
Bolcskei, H.2
Kneubuhler, F.3
-
21
-
-
0003663467
-
-
New York, NY, USA: McGraw-Hill
-
A. Papoulis, Probability, Random Variables, Stochastic Processes, 4th ed. New York, NY, USA: McGraw-Hill, 2002.
-
(2002)
Probability, Random Variables, Stochastic Processes, 4th Ed
-
-
Papoulis, A.1
-
22
-
-
78649287920
-
Training sequence design for discriminatory channel estimation in wirelessMIMO systems
-
Dec.
-
T.-H. Chang,W.-C. Chiang, Y.-W. Hong, and C.-Y. Chi, "Training sequence design for discriminatory channel estimation in wirelessMIMO systems," IEEE Trans. Signal Process., vol. 58, no. 12, pp. 6223-6237, Dec. 2010.
-
(2010)
IEEE Trans. Signal Process
, vol.58
, Issue.12
, pp. 6223-6237
-
-
Chang, T.-H.1
Chiang, W.-C.2
Hong, Y.-W.3
Chi, C.-Y.4
-
23
-
-
84861320586
-
Two-way discriminatory channel estimation for non-reciprocal wireless MIMO channels
-
Nov
-
C.-W. Huang, T.-H. Chang, X. Zhou, and Y. Hong, "Two-way discriminatory channel estimation for non-reciprocal wireless MIMO channels," in Proc. 45th Asilomar Conf. Signals, Syst., Comput., Nov. 2011, pp. 202-206.
-
(2011)
Proc. 45th Asilomar Conf. Signals, Syst., Comput
, pp. 202-206
-
-
Huang, C.-W.1
Chang, T.-H.2
Zhou, X.3
Hong, Y.4
|