메뉴 건너뛰기




Volumn 17, Issue 11, 2013, Pages 2068-2071

Secrecy-based access control for device-to-device communication underlaying cellular networks

Author keywords

access control; Device to device communication; imperfect channel state information; secrecy outage probability

Indexed keywords

ACCESS CONTROL MECHANISM; DEVICE-TO-DEVICE COMMUNICATIONS; DEVICETO-DEVICE (D2D) COMMUNICATION; IMPERFECT CHANNEL STATE INFORMATION; INTERFERENCE MANAGEMENT; OPTIMAL TRANSMISSION; SECRECY OUTAGE PROBABILITIES; WIRELESS COMMUNICATIONS;

EID: 84890430700     PISSN: 10897798     EISSN: None     Source Type: Journal    
DOI: 10.1109/LCOMM.2013.092813.131367     Document Type: Article
Times cited : (151)

References (16)
  • 1
    • 72949120015 scopus 로고    scopus 로고
    • Deviceto- device communication as an underlay to lte-advanced networks
    • Dec
    • K. Doppler, M. Rinne, C. Wijting, C. B. Ribeiro, and K. Hugl, "Deviceto- device communication as an underlay to LTE-Advanced networks," IEEE Commun. Mag., vol. 47, no. 12, pp. 42-49, Dec. 2009.
    • (2009) IEEE Commun. Mag , vol.47 , Issue.12 , pp. 42-49
    • Doppler, K.1    Rinne, M.2    Wijting, C.3    Ribeiro, C.B.4    Hugl, K.5
  • 3
    • 84890427087 scopus 로고    scopus 로고
    • Resource allocation using a reverse iterative combinatorial auction for device-to-device underlay cellular networks
    • C. Xu, L. Song, Z. Han, D. Li, and B. Jiao, "Resource allocation using a reverse iterative combinatorial auction for device-to-device underlay cellular networks," in Proc. 2012 IEEE Global Communications Conference, pp. 4764-4769.
    • Proc. 2012 IEEE Global Communications Conference , pp. 4764-4769
    • Xu, C.1    Song, L.2    Han, Z.3    Li, D.4    Jiao, B.5
  • 5
    • 54749106691 scopus 로고    scopus 로고
    • On the secrecy capacity of fading channels
    • Oct
    • P. Gopala, L. Lai, and H. El Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.10 , pp. 4687-4698
    • Gopala, P.1    Lai, L.2    El Gamal, H.3
  • 10
    • 79955491895 scopus 로고    scopus 로고
    • Interference assisted secret communication
    • May
    • X. Tang, R. Liu, P. Spasojevic, and H. V. Poor, "Interference assisted secret communication," IEEE Trans. Inf. Theory, vol. 57, no. 5, pp. 3153-3167, May 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.5 , pp. 3153-3167
    • Tang, X.1    Liu, R.2    Spasojevic, P.3    Poor, H.V.4
  • 16
    • 79952706123 scopus 로고    scopus 로고
    • Rethinking the secrecy outage formulation: A secure transmission design perspective
    • Mar
    • X. Zhou, M. R. McKay, B. Maham, and A. Hjorungnes, "Rethinking the secrecy outage formulation: a secure transmission design perspective," IEEE Commun. Lett., vol. 15, no. 3, pp. 302-304, Mar. 2011.
    • (2011) IEEE Commun. Lett , vol.15 , Issue.3 , pp. 302-304
    • Zhou, X.1    McKay, M.R.2    Maham, B.3    Hjorungnes, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.