-
1
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
June
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, June 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
2
-
-
77953802876
-
Secure transmission with multiple antennas I: The MISOME wiretap channel
-
July
-
A. Khisti and G. Wornell, "Secure transmission with multiple antennas I: the MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, July 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.7
, pp. 3088-3104
-
-
Khisti, A.1
Wornell, G.2
-
3
-
-
79960399745
-
Robust beamforming for secrecy in MIMO wiretap channels with imperfect CSI
-
Jan.
-
A. Mukherjee and A. L. Swindlehurst, "Robust beamforming for secrecy in MIMO wiretap channels with imperfect CSI," IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351-361, Jan. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.1
, pp. 351-361
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
4
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
Sep.
-
L. Lai and H. Gamal, "The relay-eavesdropper channel: cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, pp. 4005-4019, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, pp. 4005-4019
-
-
Lai, L.1
Gamal, H.2
-
5
-
-
84938932265
-
Coding for relay channels with confidential messages
-
Y. Oohama, "Coding for relay channels with confidential messages," in Proc. 2001 IEEE Inf. Theory Workshop, pp. 87-89.
-
Proc. 2001 IEEE Inf. Theory Workshop
, pp. 87-89
-
-
Oohama, Y.1
-
6
-
-
77954584734
-
Cooperation with an untrusted relay: A secrecy perspective
-
Jul.
-
X. He and A. Yener, "Cooperation with an untrusted relay: a secrecy perspective," IEEE Trans. Inf. Theory, vol. 56, pp. 3807-3827, Jul. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, pp. 3807-3827
-
-
He, X.1
Yener, A.2
-
7
-
-
76649123145
-
Two-hop secure communication using an untrusted relay
-
Article ID 305146
-
X. He and A. Yener, "Two-hop secure communication using an untrusted relay," EURASIP J. Wireless Commun. Netw., vol. 2009, Article ID 305146.
-
(2009)
EURASIP J. Wireless Commun. Netw.
-
-
He, X.1
Yener, A.2
-
8
-
-
84555190397
-
Secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system
-
Jan.
-
C. Jeong, I.-M. Kim, and D. I. Kim, "Secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system," IEEE Trans. Signal Process., vol. 60, pp. 310-325, Jan. 2012.
-
(2012)
IEEE Trans. Signal Process.
, vol.60
, pp. 310-325
-
-
Jeong, C.1
Kim, I.-M.2
Kim, D.I.3
-
9
-
-
84877718412
-
Secure communication via an untrusted non-regenerative relay in fading channels
-
May
-
J. Huang, A. Mukherjee, and A. L. Swindlehurst, "Secure communication via an untrusted non-regenerative relay in fading channels," IEEE Trans. Signal Process., vol. 61, no. 5, pp. 2536-2550, May 2013.
-
(2013)
IEEE Trans. Signal Process.
, vol.61
, Issue.5
, pp. 2536-2550
-
-
Huang, J.1
Mukherjee, A.2
Swindlehurst, A.L.3
-
10
-
-
80051720839
-
LDPC codes for the Gaussian wiretap channel
-
Sep.
-
D. Klinc, J. Ha, S. W. McLaughlin, J. Barros, and B.-J. Kwak, "LDPC codes for the Gaussian wiretap channel," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 532-540, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 532-540
-
-
Klinc, D.1
Ha, J.2
McLaughlin, S.W.3
Barros, J.4
Kwak, B.-J.5
-
11
-
-
85027929481
-
Opportunistic relaying for secrecy communications: Cooperative jamming vs relay chatting
-
June
-
Z. Ding, K. Leung, D. L. Goeckel, and D. Towsley, "Opportunistic relaying for secrecy communications: cooperative jamming vs relay chatting," IEEE Trans. Wireless Commun., vol. 10, no. 6, pp. 1725-1729, June 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.6
, pp. 1725-1729
-
-
Ding, Z.1
Leung, K.2
Goeckel, D.L.3
Towsley, D.4
-
12
-
-
15544383214
-
On the optimality of bit detection of certain digital modulations
-
Feb.
-
M. K. Simon and R. Annavajjala, "On the optimality of bit detection of certain digital modulations," IEEE Trans. Commun., vol. 53, no. 2, pp. 299-307, Feb. 2005.
-
(2005)
IEEE Trans. Commun.
, vol.53
, Issue.2
, pp. 299-307
-
-
Simon, M.K.1
Annavajjala, R.2
-
13
-
-
33846259798
-
Error floor removal for bit-interleaved coded modulation with iterative detection
-
Sep.
-
S. Pfletschinger and F. Sanzi, "Error floor removal for bit-interleaved coded modulation with iterative detection," IEEE Trans. Wireless Commun., vol. 5, no. 9, pp. 3174-3181, Sep. 2006.
-
(2006)
IEEE Trans. Wireless Commun.
, vol.5
, Issue.9
, pp. 3174-3181
-
-
Pfletschinger, S.1
Sanzi, F.2
-
14
-
-
58149120763
-
Constellation labeling maps for low error floors
-
Dec.
-
D. Torrieri and M. Valenti, "Constellation labeling maps for low error floors," IEEE Trans. Wireless Commun., vol. 7, pp. 5401-5407, Dec. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, pp. 5401-5407
-
-
Torrieri, D.1
Valenti, M.2
-
15
-
-
33947640066
-
BER analysis for decode-and-forward relaying in dissimilar Rayleigh fading channels
-
Jan.
-
I. Lee and D. Kim, "BER analysis for decode-and-forward relaying in dissimilar Rayleigh fading channels," IEEE Commun. Lett., vol. 11, no. 1, pp. 52-54, Jan. 2007.
-
(2007)
IEEE Commun. Lett.
, vol.11
, Issue.1
, pp. 52-54
-
-
Lee, I.1
Kim, D.2
-
16
-
-
84857202295
-
Dirty paper coding versus linear GSVD-based precoding in MIMO broadcast channel with confidential messages
-
S. A. A. Fakoorian and A. L. Swindlehurst, "Dirty paper coding versus linear GSVD-based precoding in MIMO broadcast channel with confidential messages," in Proc. 2011 IEEE GLOBECOM.
-
Proc. 2011 IEEE GLOBECOM
-
-
Fakoorian, S.A.A.1
Swindlehurst, A.L.2
|