-
1
-
-
79960609240
-
Enforce truth-telling in wireless relay networks for secure communication
-
S. Liu, R. Zhang, L. Song, Z. Han, and B. Jiao, "Enforce truth-telling in wireless relay networks for secure communication," in Proc. 2011 IEEE INFOCOM Workshops, pp. 1071-1075.
-
Proc. 2011 IEEE INFOCOM Workshops
, pp. 1071-1075
-
-
Liu, S.1
Zhang, R.2
Song, L.3
Han, Z.4
Jiao, B.5
-
2
-
-
0016562514
-
The wire-tap channel
-
July
-
A. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, July 1975.
-
(1975)
Bell Syst. Tech. J
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.1
-
3
-
-
0017996501
-
The Gaussian wiretap channel
-
July
-
S. K. Leung-Yan-Cheong and M. E. Hellman, "The Gaussian wiretap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, July 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.K.1
Hellman, M.E.2
-
4
-
-
0017973511
-
Broadcast channels with confidential messages
-
July
-
I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, July 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszar, I.1
Korner, J.2
-
5
-
-
69249217813
-
Secrecy capacity of a class of orthogonal relay eavesdropper channels
-
Mar
-
V. Aggarwal, L. Sankar, A. R. Calderbank, and H. V. Poor, "Secrecy capacity of a class of orthogonal relay eavesdropper channels," EURASIP J. Wireless Commun. Netw., vol. 2009, Mar. 2009.
-
(2009)
EURASIP J. Wireless Commun. Netw
, vol.2009
-
-
Aggarwal, V.1
Sankar, L.2
Calderbank, A.R.3
Poor, H.V.4
-
6
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
7
-
-
80052870842
-
On cooperative relaying schemes for wireless physical layer security
-
Oct.
-
J. Li, A. P. Petropulu, and S. Weber, "On cooperative relaying schemes for wireless physical layer security," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4985-4997, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.10
, pp. 4985-4997
-
-
Li, J.1
Petropulu, A.P.2
Weber, S.3
-
8
-
-
79551634548
-
Physical layer security for two way relay communications with friendly jammers
-
R. Zhang, L. Song, Z. Han, B. Jiao, and M. Debbah, "Physical layer security for two way relay communications with friendly jammers," in Proc. 2010 IEEE Global Telecommun. Conf.
-
Proc. 2010 IEEE Global Telecommun. Conf
-
-
Zhang, R.1
Song, L.2
Han, Z.3
Jiao, B.4
Debbah, M.5
-
9
-
-
80052165426
-
Joint relay and jammer selection for secure two-way relay networks
-
J. Chen, R. Zhang, L. Song, Z. Han, and B. Jiao, "Joint relay and jammer selection for secure two-way relay networks," in Proc. 2011 IEEE Commun. International Conf. Commun.
-
Proc. 2011 IEEE Commun. International Conf. Commun
-
-
Chen, J.1
Zhang, R.2
Song, L.3
Han, Z.4
Jiao, B.5
-
10
-
-
80052889357
-
Cooperative jamming for secure communications in MIMO relay networks
-
Oct.
-
J. Huang and A. L. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.10
, pp. 4871-4884
-
-
Huang, J.1
Swindlehurst, A.L.2
-
12
-
-
0035681225
-
Game theory in communication: Motivation, explanation, and application to power control
-
A. B. MacKenzie and S. B. Wicker, "Game theory in communication: motivation, explanation, and application to power control," in Proc. 2001 IEEE Global Telecommun. Conf., vol. 2, pp. 821-826.
-
Proc. 2001 IEEE Global Telecommun. Conf
, vol.2
, pp. 821-826
-
-
MacKenzie, A.B.1
Wicker, S.B.2
-
13
-
-
79952992733
-
Network coding based privacy preservation against traffic analysis in multi-hop wireless networks
-
Mar.
-
Y. Fan, H. Zhu, Y. Jiang, J. Chen, and Sherman Shen, "Network coding based privacy preservation against traffic analysis in multi-hop wireless networks," IEEE Trans. Wireless Commun., vol. 10, no. 3, pp. 834-843, Mar. 2011.
-
(2011)
IEEE Trans. Wireless Commun
, vol.10
, Issue.3
, pp. 834-843
-
-
Fan, Y.1
Zhu, H.2
Jiang, Y.3
Chen, J.4
Shen, S.5
-
14
-
-
84860561074
-
Secondary users cooperation in cognitive radio networks: Balancing sensing accuracy and efficienc
-
Apr.
-
R. Yu, Y. Zhang, Y. Liu, S. Xie, L. Song, and M. Guizani, "Secondary users cooperation in cognitive radio networks: balancing sensing accuracy and efficienc," IEEE Wireless Commun. Mag., vol. 19, no. 2, pp. 30-37, Apr. 2012.
-
(2012)
IEEE Wireless Commun. Mag
, vol.19
, Issue.2
, pp. 30-37
-
-
Yu, R.1
Zhang, Y.2
Liu, Y.3
Xie, S.4
Song, L.5
Guizani, M.6
-
15
-
-
73949128875
-
Constructing secured cognitive wireless networks: Experiences and challenges
-
Jan.
-
X. Zhang and C. Li, "Constructing secured cognitive wireless networks: experiences and challenges," Wireless Commun. Mobile Comput., vol. 10, no. 1, pp. 50-69, Jan. 2010.
-
(2010)
Wireless Commun. Mobile Comput
, vol.10
, Issue.1
, pp. 50-69
-
-
Zhang, X.1
Li, C.2
-
16
-
-
84926132556
-
-
Cambridge University Press
-
Z. Han, D. Niyato, W. Saad, T. Basar, and A. Hjørungnes, Game Theory in Wireless and Communication Networks: Theory, Models and Applications. Cambridge University Press, 2011.
-
(2011)
Game Theory in Wireless and Communication Networks: Theory, Models and Applications
-
-
Han, Z.1
Niyato, D.2
Saad, W.3
Basar, T.4
Hjørungnes, A.5
-
17
-
-
84867799883
-
Physical layer security for two-way untrusted relaying with friendly jammers
-
Oct.
-
R. Zhang, L. Song, Z. Han, and B. Jiao, "Physical layer security for two-way untrusted relaying with friendly jammers," IEEE Trans. Veh. Technol. , vol. 61, no. 8, pp. 3693-3704, Oct. 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.8
, pp. 3693-3704
-
-
Zhang, R.1
Song, L.2
Han, Z.3
Jiao, B.4
-
21
-
-
84980096808
-
Counterspeculation, auctions, and competitive sealed tenders
-
W. Vickrey, "Counterspeculation, auctions, and competitive sealed tenders," J. Finance, 1961.
-
(1961)
J. Finance
-
-
Vickrey, W.1
-
22
-
-
34250446073
-
Multipart pricing of public goods
-
E. Clark, "Multipart pricing of public goods," Public Choice, 1971.
-
(1971)
Public Choice
-
-
Clark, E.1
-
23
-
-
0001314984
-
Incentives in teams
-
T. Groves, "Incentives in teams," Econometrica, 1973.
-
(1973)
Econometrica
-
-
Groves, T.1
-
24
-
-
0035538082
-
Strategyproof sharing of submodular costs: Budget balance versus efficiency
-
H. Moulin and S. Shenker, "Strategyproof sharing of submodular costs: budget balance versus efficiency," Economic Theory, vol. 18, no. 3, pp. 511-533, Nov. 2001. (Pubitemid 33381129)
-
(2001)
Economic Theory
, vol.18
, Issue.3
, pp. 511-533
-
-
Moulin, H.1
Shenker, S.2
-
25
-
-
34548844184
-
Why VCG auctions can hardly be applied to the pricing of inter-domain and ad hoc networks
-
3rd EuroNGI Conf
-
P. Maille and B. Tuffin, "Why VCG auctions can hardly be applied to the pricing of inter-domain and ad hoc networks," in 2007 Next Generation Internet Netw., 3rd EuroNGI Conf.
-
2007 Next Generation Internet Netw.
-
-
Maille, P.1
Tuffin, B.2
-
27
-
-
0002444388
-
Incentives and incomplete information
-
Feb
-
C. d'Aspremont and L. A. Gerard-Varet, "Incentives and incomplete information," J. Public Econ, vol. 11, no. 1, pp. 25-45, Feb. 1979.
-
(1979)
J. Public Econ
, vol.11
, Issue.1
, pp. 25-45
-
-
D'Aspremont, C.1
Gerard-Varet, L.A.2
-
30
-
-
1642437983
-
Learning to play Bayesian games
-
DOI 10.1016/S0899-8256(03)00121-0
-
E. Dekel, D. Fudenberg, and D. K. Levine, "Learning to play Bayesian games," Games and Economic Behavior, vol. 46, no. 2 pp. 282-303, Feb. 2004. (Pubitemid 38131018)
-
(2004)
Games and Economic Behavior
, vol.46
, Issue.2
, pp. 282-303
-
-
Dekel, E.1
Fudenberg, D.2
Levine, D.K.3
|