메뉴 건너뛰기




Volumn , Issue , 2013, Pages 2188-2192

Cooperative jamming protocols in two hop amplify-and-forward wiretap channels

Author keywords

[No Author keywords available]

Indexed keywords

COMMUNICATION;

EID: 84891350212     PISSN: 15503607     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICC.2013.6654852     Document Type: Conference Paper
Times cited : (19)

References (12)
  • 2
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Oct
    • A. D. Wyner, The wire-tap channel, Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
    • (1975) Bell System Technical Journal , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 3
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Körner, Broadcast channels with confidential messages, IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 4
    • 54749106691 scopus 로고    scopus 로고
    • On the secrecy capacity of fading channels
    • Oct
    • P. K. Gopala, L. Lai, and H. E. Gamal, On the secrecy capacity of fading channels, IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687- 4698, Oct. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.10 , pp. 4687-4698
    • Gopala, P.K.1    Lai, L.2    Gamal, H.E.3
  • 5
    • 45249119255 scopus 로고    scopus 로고
    • Secure communication over fading channels
    • Shitz, June
    • Y. Liang, H. V. Poor, and S. Shamai (Shitz), Secure communication over fading channels, IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, June 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2470-2492
    • Liang, Y.1    Poor, H.V.2    Shamai, S.3
  • 6
    • 40949147785 scopus 로고    scopus 로고
    • Multiple-access channels with confidential messages
    • Mar
    • Y. Liang and H. V. Poor, Multiple-access channels with confidential messages, IEEE Trans. Inf. Theory, vol. 54, no. 3, pp. 976-1002, Mar. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.3 , pp. 976-1002
    • Liang, Y.1    Poor, H.V.2
  • 7
    • 79960996804 scopus 로고    scopus 로고
    • The secrecy capacity of the MIMO wiretap channel
    • Aug
    • F. Oggier and B. Hassibi, The secrecy capacity of the MIMO wiretap channel, IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4961-4972, Aug. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.8 , pp. 4961-4972
    • Oggier, F.1    Hassibi, B.2
  • 8
    • 51349109773 scopus 로고    scopus 로고
    • The relay-eavesdropper channel: Cooperation for secrecy
    • Sept
    • L. Lai and H. E. Gamal, The relay-eavesdropper channel: Cooperation for secrecy, IEEE Trans. Inf. Theory, vol. 54, pp. 4005-4019, Sept. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , pp. 4005-4019
    • Lai, L.1    Gamal, H.E.2
  • 10
    • 41849091900 scopus 로고    scopus 로고
    • Secure communications via cooperating base stations
    • Mar
    • O. Simeone and P. Popovski, Secure communications via cooperating base stations, IEEE Commun. Lett., vol. 12, no. 3, pp. 188-190, Mar. 2008.
    • (2008) IEEE Commun. Lett. , vol.12 , Issue.3 , pp. 188-190
    • Simeone, O.1    Popovski, P.2
  • 11
    • 67649499991 scopus 로고    scopus 로고
    • Wireless secrecy in cellular systems with infrastructure-aided cooperation
    • June
    • P. Popovski and O. Simeone, Wireless secrecy in cellular systems with infrastructure-aided cooperation, IEEE Trans. Inf. Forensics Security, vol. 4, no. 2, pp. 242-256, June 2009.
    • (2009) IEEE Trans. Inf. Forensics Security , vol.4 , Issue.2 , pp. 242-256
    • Popovski, P.1    Simeone, O.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.