-
1
-
-
84877646884
-
Outage secrecy rate in wireless relay channels using cooperative jamming
-
Anaheim, CA, USA, Dec.
-
J. Li, S. Luo, and A. Petropulu, "Outage secrecy rate in wireless relay channels using cooperative jamming," in Proc. IEEE Globecom 2012, Anaheim, CA, USA, Dec. 2012.
-
(2012)
Proc. IEEE Globecom 2012
-
-
Li, J.1
Luo, S.2
Petropulu, A.3
-
2
-
-
0016562514
-
The wiretap channel
-
Jan
-
A. D. Wyner, "The wiretap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Jan. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
3
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszar, I.1
Korner, J.2
-
4
-
-
0017996501
-
The Gaussian wire-tap channel
-
Jul
-
S. K. Leung-Yan-Cheong and M. E. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, Jul. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.K.1
Hellman, M.E.2
-
5
-
-
51649117832
-
On the Gaussian MIMO wiretap channel
-
Nice, France, Jun. 24-29
-
A. Khisti, G. Wornell, A. Wiesel, and Y. Eldar, "On the Gaussian MIMO wiretap channel," in Proc. IEEE Int. Symp. Inform. Theory (ISIT), Nice, France, Jun. 24-29, 2007, pp. 2471-2475.
-
(2007)
Proc. IEEE Int. Symp. Inform. Theory (ISIT)
, pp. 2471-2475
-
-
Khisti, A.1
Wornell, G.2
Wiesel, A.3
Eldar, Y.4
-
6
-
-
77953802876
-
Secure transmission with multiple antennas I: The MISOME wiretap channel
-
Jul
-
A. Khisti and G. Wornell, "Secure transmission with multiple antennas I: The MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, Jul. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.7
, pp. 3088-3104
-
-
Khisti, A.1
Wornell, G.2
-
7
-
-
77958560746
-
Secure transmission with multiple antennaspart II: The MIMOME wiretap channel
-
Nov
-
A. Khisti and G. Wornell, "Secure transmission with multiple antennaspart II: The MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.11
, pp. 5515-5532
-
-
Khisti, A.1
Wornell, G.2
-
8
-
-
79960996804
-
The secrecy capacity of the MIMO wiretap channel
-
Aug
-
F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4961-4972, Aug. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.8
, pp. 4961-4972
-
-
Oggier, F.1
Hassibi, B.2
-
9
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
Jun
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
10
-
-
77958083375
-
Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation
-
Oct
-
X. Zhou and M. R. McKay, "Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation," IEEE Trans. Veh. Technol., vol. 59, no. 8, pp. 3831-3842, Oct. 2010.
-
(2010)
IEEE Trans. Veh. Technol.
, vol.59
, Issue.8
, pp. 3831-3842
-
-
Zhou, X.1
McKay, M.R.2
-
11
-
-
84858390705
-
Secrecy outage in MISO systems with partial channel information
-
Arp
-
S. Gerbracht, C. Scheunert, and E. A. Jorswieck, "Secrecy outage in MISO systems with partial channel information," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 704-716, Apr. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.2
, pp. 704-716
-
-
Gerbracht, S.1
Scheunert, C.2
Jorswieck, E.A.3
-
13
-
-
84861311185
-
Safe convex approximation to outage-based MISO secrecy rate optimization under imperfect CSI and with artificial noise
-
Pacific Grove, CA, USA, Nov.
-
Q. Li, W. Ma, and A. So, "Safe convex approximation to outage-based MISO secrecy rate optimization under imperfect CSI and with artificial noise," in Proc. 45th Ann. Asilomar Conf. Signals, Systems, and Computers, Pacific Grove, CA, USA, Nov. 6-9, 2011, pp. 207-211.
-
(2011)
Proc. 45th Ann. Asilomar Conf. Signals, Systems, and Computers
, vol.6-9
, pp. 207-211
-
-
Li, Q.1
Ma, W.2
So, A.3
-
14
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
15
-
-
45249101530
-
The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming
-
Jun
-
E. Tekin and A. Yener, "The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
16
-
-
72349099904
-
Cooperative jamming forwireless physical layer security
-
Sep.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Cooperative jamming forwireless physical layer security," in Proc. IEEE/SP 15thWorkshop on Statistical Signal Processing, Sep. 2009, pp. 417-420.
-
(2009)
Proc. IEEE/SP 15thWorkshop on Statistical Signal Processing
, pp. 417-420
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
17
-
-
80052870842
-
On cooperative relaying schemes for wireless physical layer security
-
Oct
-
J. Li, A. P. Petropulu, and S. Weber, "On cooperative relaying schemes for wireless physical layer security," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4985-4997, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 4985-4997
-
-
Li, J.1
Petropulu, A.P.2
Weber, S.3
-
18
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
Sep
-
L. Lai and H. E. Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.9
, pp. 4005-4019
-
-
Lai, L.1
Gamal, H.E.2
-
19
-
-
79951618084
-
Optimal cooperative jamming to enhance physical layer security using relays
-
Mar
-
G. Zheng, L. C. Choo, and K. K. Wong, "Optimal cooperative jamming to enhance physical layer security using relays," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317-1322, Mar. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.3
, pp. 1317-1322
-
-
Zheng, G.1
Choo, L.C.2
Wong, K.K.3
-
20
-
-
79957465600
-
Wireless secrecy regions with friendly jamming
-
Jun
-
J. P. Vilela, M. Bloch, J. Barros, and S. W. McLaughlin, "Wireless secrecy regions with friendly jamming," IEEE Trans. Inf. Forensics Security, vol. 6, no. 2, pp. 256-266, Jun. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.2
, pp. 256-266
-
-
Vilela, J.P.1
Bloch, M.2
Barros, J.3
McLaughlin, S.W.4
-
22
-
-
80052889357
-
Cooperative jamming for secure communications in MIMO relay networks
-
Oct
-
J. Huang and A. L. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 4871-4884
-
-
Huang, J.1
Swindlehurst, A.L.2
-
23
-
-
85027929481
-
Opportunistic relaying for secrecy communications: Cooperative jamming vs. relay chatting
-
Jun
-
Z. Ding, K. K. Leung, D. L. Goeckel, and D. Towsley, "Opportunistic relaying for secrecy communications: Cooperative jamming vs. relay chatting," IEEE Trans. Wireless Commun., vol. 10, no. 6, pp. 1725-1729, Jun. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.6
, pp. 1725-1729
-
-
Ding, Z.1
Leung, K.K.2
Goeckel, D.L.3
Towsley, D.4
-
26
-
-
45249104850
-
Wireless information-theoretic security
-
Jun
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
27
-
-
34147092551
-
Outage capacity of the fading relay channel in the low-SNR regime
-
DOI 10.1109/TIT.2007.892773
-
A. S. Avestimehr and D. N. C. Tse, "Outage capacity of the fading relay channel in the low-SNR regime," IEEE Trans. Inf. Theory, vol. 53, no. 4, pp. 1401-1415, Apr. 2007. (Pubitemid 46562894)
-
(2007)
IEEE Transactions on Information Theory
, vol.53
, Issue.4
, pp. 1401-1415
-
-
Avestimehr, A.S.1
Tse, D.N.C.2
-
28
-
-
0030150209
-
Distribution of noncentral indefinite quadratic forms in complex normal variables
-
May
-
D. Raphaeli, "Distribution of noncentral indefinite quadratic forms in complex normal variables," IEEE Trans. Inf. Theory, vol. 42, no. 3, pp. 1002-1007, May 1996.
-
(1996)
IEEE Trans. Inf. Theory
, vol.42
, Issue.3
, pp. 1002-1007
-
-
Raphaeli, D.1
|