-
1
-
-
84890471050
-
Efficient Information Leakage Neutralization on a Relay-assisted Multi-carrier Interference Channel
-
Z. K.-M. Ho, E. Jorswieck, and S. Gerbracht, "Efficient Information Leakage Neutralization on a Relay-assisted Multi-carrier Interference Channel," in Proc. ICASSP, 2013.
-
(2013)
Proc. ICASSP
-
-
Ho, Z.K.-M.1
Jorswieck, E.2
Gerbracht, S.3
-
2
-
-
54149102613
-
Wireless future: Ubiquitous computing
-
F. Mattern, "Wireless Future : Ubiquitous Computing," in Proc. Wireless Congress, 2004, pp. 1-10.
-
(2004)
Proc. Wireless Congress
-
-
Mattern, F.1
-
6
-
-
0016562514
-
The wiretap channel
-
A. D. Wyner, "The Wiretap Channel," Bell Systems Technology J., vol. 54, pp. 1355- 1387, 1975.
-
(1975)
Bell Systems Technology J.
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
-
7
-
-
79955372872
-
Physical layer security in wireless networks: A tutorial
-
Apr
-
Y.-S. Shiu, S.-Y. Chang, H.-C. Wu, S. C.-H. Huang, and H.-W. Chen, "Physical Layer Security in Wireless Networks: A Tutorial," IEEE Trans. Wireless Commun., vol. 18, no. 2, pp. 66-74, Apr. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.18
, Issue.2
, pp. 66-74
-
-
Shiu, Y.-S.1
Chang, S.-Y.2
Wu, H.-C.3
Huang, S.C.-H.4
Chen, H.-W.5
-
8
-
-
84858162419
-
Information and inference in the wireless physical layer
-
Feb
-
H. V. Poor, "Information and Inference in the Wireless Physical Layer," IEEE Trans. Wireless Commun., vol. 19, no. 1, pp. 40-47, Feb. 2012.
-
(2012)
IEEE Trans. Wireless Commun.
, vol.19
, Issue.1
, pp. 40-47
-
-
Poor, H.V.1
-
9
-
-
79951618084
-
Optimal cooperative jamming to enhance physical layer security using relays
-
Mar
-
G. Zheng, L. C. Choo, and K. K. Wong, "Optimal Cooperative Jamming To Enhance Physical Layer Security Using Relays," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317-1322, Mar. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.3
, pp. 1317-1322
-
-
Zheng, G.1
Choo, L.C.2
Wong, K.K.3
-
11
-
-
80052889357
-
Cooperative jamming for secure communications in MIMO relay networks
-
Oct
-
J. Huang and A. L. Swindlehurst, "Cooperative Jamming for Secure Communications in MIMO Relay Networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 4871-4884
-
-
Huang, J.1
Swindlehurst, A.L.2
-
12
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
Sept
-
L. Lai and H. El Gamal, "The Relay-Eavesdropper Channel: Cooperation for Secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sept. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.9
, pp. 4005-4019
-
-
Lai, L.1
El Gamal, H.2
-
13
-
-
84870266491
-
Deaf cooperation for secrecy with multiple antennas at the helper
-
Dec
-
R. Bassily and S. Ulukus, "Deaf Cooperation for Secrecy with Multiple Antennas at the Helper," IEEE Trans. Inf. Forens. Security, vol. 7, no. 6, pp. 1855- 1864, Dec. 2012.
-
(2012)
IEEE Trans. Inf. Forens. Security
, vol.7
, Issue.6
, pp. 1855-1864
-
-
Bassily, R.1
Ulukus, S.2
-
14
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving Wireless Physical Layer Security via Cooperating Relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
15
-
-
80855123713
-
Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks
-
Oct
-
D. W.-K. Ng, E. S. Lo, and R. Schober, "Secure Resource Allocation and Scheduling for OFDMA Decode-and-Forward Relay Networks," IEEE Trans. Wireless Commun., vol. 10, no. 10, pp. 3528-3540, Oct. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.10
, pp. 3528-3540
-
-
Ng, D.W.-K.1
Lo, E.S.2
Schober, R.3
-
16
-
-
85008537206
-
Secure communication in multiple relay networks through decode-and-forward strategies
-
Aug.
-
R. Bassily and S. Ulukus, "Secure Communication in Multiple Relay Networks Through Decode-and-Forward Strategies," J. Communications and Networks, vol. 14, no. 4, pp. 352-363, Aug. 2012.
-
(2012)
J. Communications and Networks
, vol.14
, Issue.4
, pp. 352-363
-
-
Bassily, R.1
Ulukus, S.2
-
17
-
-
77954584734
-
Cooperation with an untrusted relay: A secrecy perspective
-
Aug
-
X. He and A. Yener, "Cooperation With an Untrusted Relay: A Secrecy Perspective," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3807-3827, Aug. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.8
, pp. 3807-3827
-
-
He, X.1
Yener, A.2
-
18
-
-
79960924789
-
Link adaptation for fixed relaying with untrusted relays: Transmission strategy design and performance analysis
-
H. Khodakarami and F. Lahouti, "Link Adaptation for Fixed Relaying with Untrusted Relays: Transmission Strategy Design and Performance Analysis," in Proc. International Conference on Telecommunications, 2011, pp. 309-314.
-
(2011)
Proc. International Conference on Telecommunications
, pp. 309-314
-
-
Khodakarami, H.1
Lahouti, F.2
-
19
-
-
84555190397
-
Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system
-
Jan
-
C. Jeong, I. M. Kim, and D. I. Kim, "Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System," IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310- 325, Jan. 2012.
-
(2012)
IEEE Trans. Signal Process.
, vol.60
, Issue.1
, pp. 310-325
-
-
Jeong, C.1
Kim, I.M.2
Kim, D.I.3
-
21
-
-
80051775150
-
Power and subcarrier allocation for physical-layer security in OFDMA-based broadband wireless networks
-
Set
-
X.-W. Wang, M.-X. Tao, J.-H. Mo, and Y.-Y. Xu, "Power and Subcarrier Allocation for Physical-Layer Security in OFDMA-Based Broadband Wireless Networks," IEEE Trans. Inf. Forens. Security, vol. 6, no. 3, pp. 693-702, Sept. 2011.
-
(2011)
IEEE Trans. Inf. Forens. Security
, vol.6
, Issue.3
, pp. 693-702
-
-
Wang, X.-W.1
Tao, M.-X.2
Mo, J.-H.3
Xu, Y.-Y.4
-
22
-
-
84863913546
-
Physical-layer secrecy for OFDM transmissions over fading channels
-
Aug
-
F. Renna, N. Laurenti, and H. V. Poor, "Physical-Layer Secrecy for OFDM Transmissions Over Fading Channels," IEEE Trans. Inf. Forens. Security, vol. 7, no. 4, pp. 1354-1367, Aug. 2012.
-
(2012)
IEEE Trans. Inf. Forens. Security
, vol.7
, Issue.4
, pp. 1354-1367
-
-
Renna, F.1
Laurenti, N.2
Poor, H.V.3
-
23
-
-
80054058314
-
Optimal power allocation for secure multicarrier relay systems
-
Nov
-
C. Jeong and I.-M. Kim, "Optimal Power Allocation for Secure Multicarrier Relay Systems," IEEE Trans. Signal Process., vol. 59, no. 11, pp. 5428-5442, Nov. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.11
, pp. 5428-5442
-
-
Jeong, C.1
Kim, I.-M.2
-
24
-
-
68949180348
-
Recent advances in amplifyand- forward two-hop relaying
-
July
-
S. Berger, M. Kuhn, and A. Wittneben, "Recent Advances in Amplifyand- Forward Two-Hop Relaying," IEEE Commun. Mag., vol. 47, no. 7, pp. 50-56, July 2009.
-
(2009)
IEEE Commun. Mag.
, vol.47
, Issue.7
, pp. 50-56
-
-
Berger, S.1
Kuhn, M.2
Wittneben, A.3
-
26
-
-
35148881115
-
Relay networks with delays
-
DOI 10.1109/TIT.2007.904838, Special issue on Models, Theory, and Codes for Relaying and Cooperation in Communication Network
-
A. El Gamal, N. Hassanpour, and J. Mammen, "Relay Networks With Delays," IEEE Trans. Inf. Theory, vol. 53, no. 10, pp. 3413-3431, Oct. 2007. (Pubitemid 47541879)
-
(2007)
IEEE Transactions on Information Theory
, vol.53
, Issue.10
, pp. 3413-3431
-
-
El Gamal, A.1
Hassanpour, N.2
Mammen, J.3
-
27
-
-
65749120701
-
Degrees of freedom of wireless networks with relays, feedback, co-operation and full duplex operation
-
May
-
V. R. Cadambe and S. A. Jafar, "Degrees of Freedom of Wireless Networks with Relays, Feedback, Co-operation and Full Duplex Operation," IEEE Trans. Inf. Theory, vol. 55, no. 5, pp. 2334-2344, May 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.5
, pp. 2334-2344
-
-
Cadambe, V.R.1
Jafar, S.A.2
-
31
-
-
64549158430
-
Transmission techniques for relay-interference networks 2008
-
Sept.
-
S. Mohajer, S. N. Diggavi, C. Fragouli, and D. N. C. Tse, "Transmission Techniques for Relay-Interference Networks," in 2008 46th Annual Allerton Conference on Communication, Control, and Computing, Sept. 2008, pp. 467-474.
-
(2008)
46th Annual Allerton Conference on Communication, Control, and Computing
, pp. 467-474
-
-
Mohajer, S.1
Diggavi, S.N.2
Fragouli, C.3
Tse, D.N.C.4
-
32
-
-
70449465520
-
Approximate capacity of a class of gaussian relay-interference networks in 2009
-
June
-
S. Mohajer, S. N. Diggavi, and D. N. C. Tse, "Approximate Capacity of a Class of Gaussian Relay-Interference Networks," in 2009 IEEE International Symposium on Information Theory, June 2009, vol. 57, pp. 31-35.
-
(2009)
IEEE International Symposium on Information Theory
, vol.57
, pp. 31-35
-
-
Mohajer, S.1
Diggavi, S.N.2
Tse, D.N.C.3
-
33
-
-
33847627548
-
Cooperative distributed multiuser MSE relaying in wireless ad-hoc networks
-
1599923, Conference Record of The Thirty-Ninth Asilomar Conference on Signals, Systems and Computers
-
S. Berger and A. Wittneben, "Cooperative Distributed Multiuser MMSE Relaying in Wireless Ad-Hoc Networks," in Proc. Asilomar Conference on Signals, Systems and Computers, 2005, pp. 1072-1076. (Pubitemid 46350478)
-
(2005)
Conference Record - Asilomar Conference on Signals, Systems and Computers
, vol.2005
, pp. 1072-1076
-
-
Berger, S.1
Wittneben, A.2
-
34
-
-
33847736358
-
Spectral efficient protocols for half-duplex fading relay channels
-
DOI 10.1109/JSAC.2007.070213
-
B. Rankov and A. Wittneben, "Spectral Efficient Protocols for Halfduplex Fading Relay Channels," IEEE J. Sel. Areas Commun., vol. 25, no. 2, pp. 379-389, Feb. 2007. (Pubitemid 46376100)
-
(2007)
IEEE Journal on Selected Areas in Communications
, vol.25
, Issue.2
, pp. 379-389
-
-
Rankov, B.1
Wittneben, A.2
-
35
-
-
84870449931
-
Instantaneous relaying: Optimal strategies and interference neutralization
-
Dec
-
Z. K.-M. Ho and E. Jorswieck, "Instantaneous Relaying: Optimal Strategies and Interference Neutralization," IEEE Trans. Signal Process., vol. 60, no. 12, pp. 6655- 6668, Dec. 2012.
-
(2012)
IEEE Trans. Signal Process.
, vol.60
, Issue.12
, pp. 6655-6668
-
-
Ho, Z.K.-M.1
Jorswieck, E.2
-
36
-
-
84874066006
-
Nonregenerative two-hop wiretap channels using interference neutralization
-
S. Gerbracht, E. A. Jorswieck, G. Zheng, and B. Ottersten, "Nonregenerative Two-Hop Wiretap Channels using Interference Neutralization," in Proc. IEEE International Workshop on Information Forensics and Security (WIFS), 2012.
-
(2012)
Proc. IEEE International Workshop on Information Forensics and Security (WIFS)
-
-
Gerbracht, S.1
Jorswieck, E.A.2
Zheng, G.3
Ottersten, B.4
-
38
-
-
77958560746
-
Secure transmission with multiple antennas- Part II: The MIMOME wiretap channel
-
Nov
-
A. Khisti and G. Wornell, "Secure Transmission with Multiple Antennas- Part II: The MIMOME Wiretap Channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515- 5532, Nov. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.11
, pp. 5515-5532
-
-
Khisti, A.1
Wornell, G.2
|