-
1
-
-
68349116049
-
Information theoretic security
-
Y. Liang, H. Poor et al., "Information theoretic security," Foundations and Trends in Communications and Information Theory, vol. 5, pp. 355-580, 2009.
-
(2009)
Foundations and Trends in Communications and Information Theory
, vol.5
, pp. 355-580
-
-
Liang, Y.1
Poor, H.2
-
2
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
Sep
-
L. Lai and H. El Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.9
, pp. 4005-4019
-
-
Lai, L.1
El Gamal, H.2
-
3
-
-
80054058314
-
Optimal power allocation for secure multicarrier relay systems
-
Nov
-
C. Jeong and I.-M. Kim, "Optimal power allocation for secure multicarrier relay systems," IEEE Trans. Signal Process., vol. 59, no. 11, pp. 5428-5442, Nov. 2011.
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.11
, pp. 5428-5442
-
-
Jeong, C.1
Kim, I.-M.2
-
4
-
-
80855123713
-
Secure resource allocation and scheduling for ofdma decode-and-forward relay networks
-
Oct
-
D. Ng, E. Lo, and R. Schober, "Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks," IEEE Trans. Wireless Commun., vol. 10, no. 10, pp. 3528-3540, Oct. 2011.
-
(2011)
IEEE Trans. Wireless Commun
, vol.10
, Issue.10
, pp. 3528-3540
-
-
Ng, D.1
Lo, E.2
Schober, R.3
-
5
-
-
80052889357
-
Cooperative jamming for secure communications in mimo relay networks
-
Oct
-
J. Huang and A. Swindlehurst, "Cooperative jamming for secure communications in mimo relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.10
, pp. 4871-4884
-
-
Huang, J.1
Swindlehurst, A.2
-
6
-
-
84862571591
-
Relay placement for physical layer security: A secure connection perspective
-
Jun
-
J. Mo, M. Tao, and Y. Liu, "Relay placement for physical layer security: A secure connection perspective," IEEE Commun. Lett., vol. 16, no. 6, pp. 878-881, Jun. 2012.
-
(2012)
IEEE Commun. Lett
, vol.16
, Issue.6
, pp. 878-881
-
-
Mo, J.1
Tao, M.2
Liu, Y.3
-
7
-
-
84862963131
-
Joint relay and jammer selection for secure two-way relay networks
-
Feb
-
J. Chen, R. Zhang, L. Song, Z. Han, and B. Jiao, "Joint relay and jammer selection for secure two-way relay networks," IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 310-320, Feb. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.1
, pp. 310-320
-
-
Chen, J.1
Zhang, R.2
Song, L.3
Han, Z.4
Jiao, B.5
-
8
-
-
84863956395
-
Improving wireless security for bidirectional communication scenarios
-
Jul
-
Z. Ding, M. Xu, J. Lu, and F. Liu, "Improving wireless security for bidirectional communication scenarios," IEEE Trans. Veh. Technol., vol. 61, no. 6, pp. 2842-2848, Jul. 2012.
-
(2012)
IEEE Trans. Veh. Technol
, vol.61
, Issue.6
, pp. 2842-2848
-
-
Ding, Z.1
Xu, M.2
Lu, J.3
Liu, F.4
-
10
-
-
84862635573
-
Distributed beamforming for physical-layer security of two-way relay networks
-
Jul
-
H.-M. Wang, Q. Yin, and X.-G. Xia, "Distributed beamforming for physical-layer security of two-way relay networks," IEEE Trans. Signal Process., vol. 60, no. 7, pp. 3532-3545, Jul. 2012.
-
(2012)
IEEE Trans. Signal Process
, vol.60
, Issue.7
, pp. 3532-3545
-
-
Wang, H.-M.1
Yin, Q.2
Xia, X.-G.3
-
11
-
-
80051752373
-
Two-hop secure communication using an untrusted relay: A case for cooperative jamming
-
X. He and A. Yener, "Two-hop secure communication using an untrusted relay: A case for cooperative jamming," in IEEE Global Telecommunications Conference, 2008, pp. 1-5.
-
(2008)
IEEE Global Telecommunications Conference
, pp. 1-5
-
-
He, X.1
Yener, A.2
-
12
-
-
84867800602
-
Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes
-
Oct
-
L. Sun, T. Zhang, Y. Li, and H. Niu, "Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes," IEEE Trans. Veh. Technol., vol. 61, no. 8, pp. 3801-3807, Oct. 2012.
-
(2012)
IEEE Trans. Veh. Technol
, vol.61
, Issue.8
, pp. 3801-3807
-
-
Sun, L.1
Zhang, T.2
Li, Y.3
Niu, H.4
-
13
-
-
77954584734
-
Cooperation with an untrusted relay: A secrecy perspective
-
Aug
-
X. He and A. Yener, "Cooperation with an untrusted relay: A secrecy perspective," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3807-3827, Aug. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.8
, pp. 3807-3827
-
-
He, X.1
Yener, A.2
-
14
-
-
84555190397
-
Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system
-
Jan
-
C. Jeong, I.-M. Kim, and D. I. Kim, "Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system," IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310-325, Jan. 2012.
-
(2012)
IEEE Trans. Signal Process
, vol.60
, Issue.1
, pp. 310-325
-
-
Jeong, C.1
Kim, I.-M.2
Kim, D.I.3
-
15
-
-
84867799883
-
Physical layer security for two-way untrusted relaying with friendly jammers
-
R. Zhang, L. Song, Z. Han, and B. Jiao, "Physical layer security for two-way untrusted relaying with friendly jammers," IEEE Trans. Veh. Technol., vol. PP, no. 99, p. 1, 2012.
-
(2012)
IEEE Trans. Veh. Technol
, Issue.99
, pp. 1
-
-
Zhang, R.1
Song, L.2
Han, Z.3
Jiao, B.4
-
16
-
-
77953745487
-
Degrees of freedom of the mimo y channel: Signal space alignment for network coding
-
Jul
-
N. Lee, J.-B. Lim, and J. Chun, "Degrees of freedom of the mimo y channel: Signal space alignment for network coding," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3332-3342, Jul. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.7
, pp. 3332-3342
-
-
Lee, N.1
Lim, J.-B.2
Chun, J.3
-
17
-
-
45249101530
-
The general gaussian multiple-access and twoway wiretap channels: Achievable rates and cooperative jamming
-
Jun
-
E. Tekin and A. Yener, "The general gaussian multiple-access and twoway wiretap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
18
-
-
77953802876
-
Secure transmission with multiple antennas i: The misome wiretap channel
-
Jul
-
A. Khisti and G. Wornell, "Secure transmission with multiple antennas I: The MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, Jul. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.7
, pp. 3088-3104
-
-
Khisti, A.1
Wornell, G.2
-
19
-
-
79957663476
-
Optimal design of spatial source-and-relay matrices for a non-regenerative two-way mimo relay system
-
May
-
S. Xu and Y. Hua, "Optimal design of spatial source-and-relay matrices for a non-regenerative two-way mimo relay system," IEEE Trans. Wireless Commun., vol. 10, no. 5, pp. 1645-1655, May 2011.
-
(2011)
IEEE Trans. Wireless Commun
, vol.10
, Issue.5
, pp. 1645-1655
-
-
Xu, S.1
Hua, Y.2
|