-
1
-
-
1842765623
-
Topics in wireless security
-
Feb
-
T. Woo and Y. Yacobi, "Topics in wireless security," IEEE Wireless Communications, vol. 11, no. 1, pp. 6-7, Feb. 2004.
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.1
, pp. 6-7
-
-
Woo, T.1
Yacobi, Y.2
-
2
-
-
74549186525
-
Wireless physical-layer security: The challenges ahead
-
Haiphong, Vietnam, Oct
-
M. Di Renzo and M. Debbah, "Wireless physical-layer security: The challenges ahead," in Proc. International Conference on Advanced Technologies for Communications, Haiphong, Vietnam, Oct. 2009. pp. 313-316.
-
(2009)
Proc. International Conference on Advanced Technologies for Communications
, pp. 313-316
-
-
Di Renzo, M.1
Debbah, M.2
-
3
-
-
45249104850
-
Wireless informationtheoretic security
-
June
-
M. Bloch, J. Barros, M. R. D. Rodrigues, et al., "Wireless informationtheoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, June 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
-
4
-
-
84872099887
-
Secrecy capacity enhancement with distributed precoding in multirelay wiretap systems
-
Jan
-
Hang Long, Wei Xiang, Yueying Zhang, et al., "Secrecy capacity enhancement with distributed precoding in multirelay wiretap systems," IEEE Transactions on Information Forensics and Security, vol. 8, no. 1, pp. 229-238, Jan. 2013.
-
(2013)
IEEE Transactions on Information Forensics and Security
, vol.8
, Issue.1
, pp. 229-238
-
-
Long, H.1
Xiang, W.2
Zhang, Y.3
-
5
-
-
84931425598
-
Secret communications using artificial noise
-
Dallas, TX, Sept.
-
R. Negi and S. Goel, "Secret communications using artificial noise," in Proc. IEEE Vehicular Technology Conference (VTC), Dallas, TX, Sept. 2005, pp. 1906-1910.
-
(2005)
Proc. IEEE Vehicular Technology Conference (VTC)
, pp. 1906-1910
-
-
Negi, R.1
Goel, S.2
-
6
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
June
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Communications, vol. 7, no. 6, pp. 2180-2189, June 2008.
-
(2008)
IEEE Trans. Wireless Communications
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
7
-
-
84940659555
-
Achievable rates for the general gaussian multiple access wire-tap channel with collective secrecy
-
Monticello, IL, Sep.
-
E. Tekin and A. Yener, "Achievable rates for the general Gaussian multiple access wire-tap channel with collective secrecy," in Proc. Allerton Conference on Communication, Control, and Computing (ACCCC), Monticello, IL, Sep. 2006, pp. 1-5.
-
(2006)
Proc. Allerton Conference on Communication, Control, and Computing (ACCCC)
, pp. 1-5
-
-
Tekin, E.1
Yener, A.2
-
8
-
-
70350583050
-
Relay selection for secure cooperative networks with jamming
-
Oct
-
I. Krikidis, J. Thompson and S. Mclaughlin, "Relay selection for secure cooperative networks with jamming," IEEE Trans. Wireless Comms., vol. 8, no. 10, pp. 5003-5011, Oct. 2009.
-
(2009)
IEEE Trans. Wireless Comms
, vol.8
, Issue.10
, pp. 5003-5011
-
-
Krikidis, I.1
Thompson, J.2
McLaughlin, S.3
-
9
-
-
80052157752
-
Cooperative jamming and power allocation for wireless relay networks in presence of eavesdropper
-
Kyoto, Japan, June
-
Lun Dong, H. Yousefi'zadeh, and H. Jafarkhani, "Cooperative jamming and power allocation for wireless relay networks in presence of eavesdropper," in Proc. IEEE International Conference on Communications (ICC), Kyoto, Japan, June 2011, pp. 1-5.
-
(2011)
Proc. IEEE International Conference on Communications (ICC)
, pp. 1-5
-
-
Dong, L.1
Yousefi'zadeh, H.2
Jafarkhani, H.3
-
10
-
-
41849091900
-
Secure communications via cooperating base stations
-
Mar
-
O. Simeone and P. Popovski, "Secure communications via cooperating base stations," IEEE Communications Letters, vol. 12, no. 3, pp. 188-190, Mar. 2008.
-
(2008)
IEEE Communications Letters
, vol.12
, Issue.3
, pp. 188-190
-
-
Simeone, O.1
Popovski, P.2
-
11
-
-
84856104619
-
Recruiting multi-antenna transmitters as cooperative jammers: An auction-theoretic approach
-
Monticello, IL, Sep.
-
I. Stanojev and A. Yener, "Recruiting multi-antenna transmitters as cooperative jammers: An auction-theoretic approach," in Proc. Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, Sep. 2011, pp. 1106-1112.
-
(2011)
Proc. Annual Allerton Conference on Communication, Control, and Computing (Allerton)
, pp. 1106-1112
-
-
Stanojev, I.1
Yener, A.2
-
12
-
-
84861601537
-
Physical layer security from inter-session interference in large wireless networks
-
Orlando, FL, Mar.
-
A. Sheikholeslami, D. Goeckel, H. Pishro-Nik, et al. "Physical layer security from inter-session interference in large wireless networks," in Proc. IEEE INFOCOM, Orlando, FL, Mar. 2012, pp. 1179-1187.
-
(2012)
Proc. IEEE INFOCOM
, pp. 1179-1187
-
-
Sheikholeslami, A.1
Goeckel, D.2
Pishro-Nik, H.3
-
13
-
-
84871986888
-
Diversity analysis of two-way mimo relaying system based on zero-forcing
-
Ottawa, Canada, June
-
Hang Long, Wei Xiang, Hongmei Liu, et al., "Diversity analysis of two-way MIMO relaying system based on zero-forcing," in Proc. IEEE International Conference on Communications (ICC) 2012 workshop, Ottawa, Canada, June 2012, pp. 5640-5644.
-
(2012)
Proc. IEEE International Conference on Communications (ICC) 2012 Workshop
, pp. 5640-5644
-
-
Long, H.1
Xiang, W.2
Liu, H.3
-
14
-
-
79551634548
-
Physical layer security for two way relay communications with friendly jammers
-
Miami, Florida, Dec.
-
Rongqing Zhang, Lingyang Song, Zhu Han, et al., "Physical layer security for two way relay communications with friendly jammers," in Proc. IEEE Globecom 2010, Miami, Florida, Dec. 2010, pp. 1-6.
-
(2010)
Proc. IEEE Globecom 2010
, pp. 1-6
-
-
Zhang, R.1
Song, L.2
Han, Z.3
-
15
-
-
80052165426
-
Joint relay and jammer selection for secure two-way relay networks
-
Kyoto, Japan, June
-
Jingchao Chen, Rongqing Zhang, Lingyang Song, et al., "Joint relay and jammer selection for secure two-way relay networks," in Proc. IEEE International Conference on Communications (ICC), Kyoto, Japan, June 2011, pp. 1-5.
-
(2011)
Proc. IEEE International Conference on Communications (ICC)
, pp. 1-5
-
-
Chen, J.1
Zhang, R.2
Song, L.3
-
16
-
-
84863152970
-
Joint relay and jammer selection for secure decode-and-forward two-way relay communications
-
Houston, TX, Dec.
-
Jingchao Chen, Lingyang Song, Zhu Han, et al., "Joint relay and jammer selection for secure decode-and-forward two-way relay communications," in Proc. IEEE Global Telecommunications Conference (GLOBECOM), Houston, TX, Dec. 2011, pp. 1-5.
-
(2011)
Proc. IEEE Global Telecommunications Conference (GLOBECOM)
, pp. 1-5
-
-
Chen, J.1
Song, L.2
Han, Z.3
-
17
-
-
84863956395
-
Improving wireless security for bidirectional communication scenarios
-
July
-
Zhiguo Ding, Mai Xu, Jianhua Lu, et al., "Improving wireless security for bidirectional communication scenarios," IEEE Trans. Vehicular Technology, vol. 61, no. 6, pp. 2842-2848, July 2012.
-
(2012)
IEEE Trans. Vehicular Technology
, vol.61
, Issue.6
, pp. 2842-2848
-
-
Ding, Z.1
Xu, M.2
Lu, J.3
-
18
-
-
84862963131
-
Joint relay and jammer selection for secure two-way relay networks
-
Feb
-
Jingchao Chen, Rongqing Zhang, Lingyang Song, et al., "Joint relay and jammer selection for secure two-way relay networks," IEEE Trans. Information Forensics and Security, vol. 7, no. 1, part 2, pp. 310-320, Feb. 2012.
-
(2012)
IEEE Trans. Information Forensics and Security
, vol.7
, Issue.1 PART 2
, pp. 310-320
-
-
Chen, J.1
Zhang, R.2
Song, L.3
-
19
-
-
0017996501
-
The gaussian wire-tap channel
-
July
-
S. Leung-Yan-Cheong and M. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, July 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.1
Hellman, M.2
|