-
1
-
-
5044252003
-
Cooperative diversity in wireless networks: Efficient protocols and outage behavior
-
Dec.
-
J. N. Laneman, D. N. C. Tse, and G. W. Wornell, "Cooperative diversity in wireless networks: efficient protocols and outage behavior," IEEE Trans. Inf. Theory, vol. 50, No. 12, pp. 3062-3080, Dec. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.12
, pp. 3062-3080
-
-
Laneman, J.N.1
Tse, D.N.C.2
Wornell, G.W.3
-
2
-
-
84877718412
-
Secure communication via an untrusted non-regenerative relay in fading channels
-
May.
-
J. Huang, A. Mukherjee, and A. L. Swindlehurst, "Secure communication via an untrusted non-regenerative relay in fading channels," IEEE Trans. Signal Process., vol. 61, No. 10, pp. 2536-2550, May 2013.
-
(2013)
IEEE Trans. Signal Process.
, vol.61
, Issue.10
, pp. 2536-2550
-
-
Huang, J.1
Mukherjee, A.2
Swindlehurst, A.L.3
-
3
-
-
45249104850
-
Wireless information-theoretic security
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, No. 6, pp. 2515-2534, 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
4
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, No. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
5
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Technol. J., vol. 54, No. 8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Technol. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
6
-
-
79960433598
-
Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming
-
Aug.
-
Q. Li and W.-K. Ma, "Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming," IEEE Trans. Signal Process., vol. 59, No. 8, pp. 3799-3812, Aug. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.8
, pp. 3799-3812
-
-
Li, Q.1
Ma, W.-K.2
-
7
-
-
80051752373
-
Two-hop secure communication using an untrusted relay: A case for cooperative jamming
-
X. He and A. Yener, "Two-hop secure communication using an untrusted relay: a case for cooperative jamming," in Proc. 2008 IEEE Global Telecommun. Conf., pp. 1-5.
-
Proc. 2008 IEEE Global Telecommun. Conf.
, pp. 1-5
-
-
He, X.1
Yener, A.2
-
8
-
-
77954584734
-
Cooperation with an untrusted relay: A secrecy perspective
-
-, "Cooperation with an untrusted relay: a secrecy perspective," IEEE Trans. Inf. Theory, vol. 56, No. 8, pp. 3807-3827, 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.8
, pp. 3807-3827
-
-
He, X.1
Yener, A.2
-
11
-
-
84867800602
-
Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes
-
Oct.
-
L. Sun, T. Zhang, Y. Li, and H. Niu, "Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes," IEEE Trans. Veh. Technol., vol. 61, No. 8, pp. 3801-3807, Oct. 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.8
, pp. 3801-3807
-
-
Sun, L.1
Zhang, T.2
Li, Y.3
Niu, H.4
-
12
-
-
84880150823
-
Large system analysis of linear precoding in MISO broadcast channels with confidential messages
-
Sep.
-
G. Geraci, R. Couillet, J. Yuan, M. Debbah, and I. B. Collings, "Large system analysis of linear precoding in MISO broadcast channels with confidential messages," IEEE J. Sel. Areas Commun., vol. 31, No. 9, pp. 1660-1671, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
, pp. 1660-1671
-
-
Geraci, G.1
Couillet, R.2
Yuan, J.3
Debbah, M.4
Collings, I.B.5
-
13
-
-
84877926659
-
Energy and spectral efficiency of very large multiuser MIMO systems
-
Apr.
-
H. Q. Ngo, E. G. Larsson, and T. L. Marzetta, "Energy and spectral efficiency of very large multiuser MIMO systems," IEEE Trans. Commun., vol. 61, No. 4, pp. 1436-1449, Apr. 2013.
-
(2013)
IEEE Trans. Commun.
, vol.61
, Issue.4
, pp. 1436-1449
-
-
Ngo, H.Q.1
Larsson, E.G.2
Marzetta, T.L.3
-
14
-
-
84555190397
-
Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system
-
Jan.
-
C. Jeong, I.-M. Kim, and D. I. Kim, "Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system," IEEE Trans. Signal Process., vol. 60, No. 1, pp. 310-325, Jan. 2012.
-
(2012)
IEEE Trans. Signal Process.
, vol.60
, Issue.1
, pp. 310-325
-
-
Jeong, C.1
Kim, I.-M.2
Kim, D.I.3
-
15
-
-
67651180823
-
Performance analysis of beamforming in two hop amplify and forward relay networks with antenna correlation
-
June
-
R. H. Y. Louie, Y. Li, H. A. Suraweera, and B. Vucetic, "Performance analysis of beamforming in two hop amplify and forward relay networks with antenna correlation," IEEE Trans. Wireless Commun., vol. 8, No. 6, pp. 3132-3141, June 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.6
, pp. 3132-3141
-
-
Louie, R.H.Y.1
Li, Y.2
Suraweera, H.A.3
Vucetic, B.4
|