-
1
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, 1975.
-
(1975)
Bell Syst. Tech. J
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
2
-
-
0017996501
-
The Gaussian wire-tap channel
-
Jul
-
S. Leung-Yan-Cheong and M. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, Jul. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.1
Hellman, M.2
-
3
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
4
-
-
52349090496
-
The secrecy capacity of the mimo wiretap channel
-
Toronto, Canada, Jul
-
F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," in Proc. IEEE ISIT, Toronto, Canada, Jul. 2008, pp. 524-528.
-
(2008)
Proc. IEEE ISIT
, pp. 524-528
-
-
Oggier, F.1
Hassibi, B.2
-
5
-
-
69449086815
-
Towards the secrecy capacity of the gaussian mimo wire-tap channel: The 2-2-1 channel
-
Sep
-
S. Shafiee, N. Liu, and S. Ulukus, "Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel," IEEE Trans. Inf. Theory, vol. 55, no. 9, pp. 4033-4039, Sep. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.9
, pp. 4033-4039
-
-
Shafiee, S.1
Liu, N.2
Ulukus, S.3
-
6
-
-
77958560746
-
Secure transmission with multiple antennas-part ii: The mimome wiretap channel
-
Nov
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas-Part II: The MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.11
, pp. 5515-5532
-
-
Khisti, A.1
Wornell, G.W.2
-
7
-
-
84867563712
-
Optimal power allocation for gsvd-based beamforming in the mimo gaussian wiretap channel
-
Cambridge, MA, USA, Jul
-
S. A. A. Fakoorian and A. L. Swindlehurst, "Optimal power allocation for GSVD-based beamforming in the MIMO Gaussian wiretap channel," in Proc. ISIT, Cambridge, MA, USA, Jul. 2012, pp. 2321-2325.
-
(2012)
Proc. ISIT
, pp. 2321-2325
-
-
Fakoorian, S.A.A.1
Swindlehurst, A.L.2
-
8
-
-
84877752784
-
Full rank solutions for the mimo gaussian wiretap channel with an average power constraint
-
May
-
S. A. A. Fakoorian and A. L. Swindlehurst, "Full rank solutions for the MIMO Gaussian wiretap channel with an average power constraint," IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2620-2631, May 2013.
-
(2013)
IEEE Trans. Signal Process
, vol.61
, Issue.10
, pp. 2620-2631
-
-
Fakoorian, S.A.A.1
Swindlehurst, A.L.2
-
9
-
-
84883395356
-
Transmit solutions for mimo wiretap channels using alternating optimization
-
Sep
-
Q. Li, M. Hong, H.-T. Wai, Y.-F. Liu, W.-K. Ma, and Z.-Q. Luo, "Transmit solutions for MIMO wiretap channels using alternating optimization," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1714-1726, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun
, vol.31
, Issue.9
, pp. 1714-1726
-
-
Li, Q.1
Hong, M.2
Wai, H.-T.3
Liu, Y.-F.4
Ma, W.-K.5
Luo, Z.-Q.6
-
10
-
-
66949180834
-
A note on the secrecy capacity of the multipleantenna wiretap channel
-
Jun
-
T. Liu and S. Shamai, "A note on the secrecy capacity of the multipleantenna wiretap channel," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, Jun. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.6
, pp. 2547-2553
-
-
Liu, T.1
Shamai, S.2
-
11
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
12
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
Sep
-
L. Lai and H. El Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.9
, pp. 4005-4019
-
-
Lai, L.1
El Gamal, H.2
-
13
-
-
80052870842
-
On cooperative relaying schemes for wireless physical layer security
-
Oct
-
J. Li, A. P. Petropulu, and S. Weber, "On cooperative relaying schemes for wireless physical layer security," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4985-4997, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.10
, pp. 4985-4997
-
-
Li, J.1
Petropulu, A.P.2
Weber, S.3
-
14
-
-
84862635573
-
Distributed beamforming for physical-layer security of two-way relay networks
-
Jul
-
H.-M. Wang, Q. Yin, and X.-G. Xia, "Distributed beamforming for physical-layer security of two-way relay networks," IEEE Trans. Signal Process., vol. 60, no. 7, pp. 3532-3545, Jul. 2012.
-
(2012)
IEEE Trans. Signal Process
, vol.60
, Issue.7
, pp. 3532-3545
-
-
Wang, H.-M.1
Yin, Q.2
Xia, X.-G.3
-
15
-
-
77955397265
-
Friendly jamming for wireless secrecy
-
Cape Town, South Africa, May
-
M. Bloch, J. Barros, J. P. Vilela, and S. W. McLaughlin, "Friendly jamming for wireless secrecy," in Proc. IEEE ICC, Cape Town, South Africa, May 2010, pp. 1-6.
-
(2010)
Proc. IEEE ICC
, pp. 1-6
-
-
Bloch, M.1
Barros, J.2
Vilela, J.P.3
McLaughlin, S.W.4
-
16
-
-
70350583050
-
Relay selection for secure cooperative networks with jamming
-
Oct
-
I. Krikidis, J. S. Thompson, and S. Mclaughlin, "Relay selection for secure cooperative networks with jamming," IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5003-5011, Oct. 2009.
-
(2009)
IEEE Trans. Wireless Commun
, vol.8
, Issue.10
, pp. 5003-5011
-
-
Krikidis, I.1
Thompson, J.S.2
McLaughlin, S.3
-
17
-
-
79551634548
-
Physical layer security for two way relay communications with friendly jammers
-
Miami, FL, USA, Dec
-
R. Zhang, L. Song, Z. Han, B. Jiao, and M. Debbah, "Physical layer security for two way relay communications with friendly jammers," in Proc. IEEE GLOBECOM, Miami, FL, USA, Dec. 2010, pp. 1-6.
-
(2010)
Proc. IEEE GLOBECOM
, pp. 1-6
-
-
Zhang, R.1
Song, L.2
Han, Z.3
Jiao, B.4
Debbah, M.5
-
18
-
-
79951618084
-
Optimal cooperative jamming to enhance physical layer security using relays
-
Mar
-
G. Zheng, L.-C. Choo, and K.-K. Wong, "Optimal cooperative jamming to enhance physical layer security using relays," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317-1322, Mar. 2011.
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.3
, pp. 1317-1322
-
-
Zheng, G.1
Choo, L.-C.2
Wong, K.-K.3
-
19
-
-
84877654656
-
Hybrid cooperative relaying and jamming for secure two-way relay networks
-
Anaheim, CA, USA, Dec
-
H.-M. Wang, M. Luo, and Q. Yin, "Hybrid cooperative relaying and jamming for secure two-way relay networks," in Proc. GLOBECOM, Anaheim, CA, USA, Dec. 2012, pp. 4846-4850.
-
(2012)
Proc. GLOBECOM
, pp. 4846-4850
-
-
Wang, H.-M.1
Luo, M.2
Yin, Q.3
-
20
-
-
84888318377
-
Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks
-
Dec
-
H.-M. Wang, M. Luo, Q. Yin, and X.-G. Xia, "Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks," IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 2007-2020, Dec. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.12
, pp. 2007-2020
-
-
Wang, H.-M.1
Luo, M.2
Yin, Q.3
Xia, X.-G.4
-
21
-
-
84870512709
-
Joint cooperative beamforming and jamming to secure af relay systems with individual power constraint and no eavesdropper's csi
-
Jan
-
H.-M. Wang, M. Luo, X.-G. Xia, and Q. Yin, "Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's CSI," IEEE Signal Process. Lett., vol. 20, no. 1, pp. 39-42, Jan. 2013.
-
(2013)
IEEE Signal Process. Lett
, vol.20
, Issue.1
, pp. 39-42
-
-
Wang, H.-M.1
Luo, M.2
Xia, X.-G.3
Yin, Q.4
-
22
-
-
80052889357
-
Cooperative jamming for secure communications in mimo relay networks
-
Oct
-
J. Huang and A. L. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.10
, pp. 4871-4884
-
-
Huang, J.1
Swindlehurst, A.L.2
-
23
-
-
80051619768
-
Cooperation strategies for secrecy in mimo relay networks with unknown eavesdropper csi
-
Prague, Czech Republic, May
-
J. Huang and A. L. Swindlehurst, "Cooperation strategies for secrecy in MIMO relay networks with unknown eavesdropper CSI," in Proc. IEEE ICASSP, Prague, Czech Republic, May 2011, pp. 3424-3427.
-
(2011)
Proc. IEEE ICASSP
, pp. 3424-3427
-
-
Huang, J.1
Swindlehurst, A.L.2
-
24
-
-
84856271363
-
On the application of cooperative transmission to secrecy communications
-
Feb
-
Z. Ding, K. K. Leung, D. L. Goeckel, and D. Towsley, "On the application of cooperative transmission to secrecy communications," IEEE J. Sel. Areas Commun., vol. 30, no. 2, pp. 359-368, Feb. 2012.
-
(2012)
IEEE J. Sel. Areas Commun
, vol.30
, Issue.2
, pp. 359-368
-
-
Ding, Z.1
Leung, K.K.2
Goeckel, D.L.3
Towsley, D.4
-
25
-
-
84865017592
-
Joint svd-gsvd precoding technique and secrecy capacity lower bound for the mimo relay wire-tap channel
-
May
-
M. Jilani and T. Ohtsuki, "Joint SVD-GSVD precoding technique and secrecy capacity lower bound for the MIMO relay wire-tap channel," in Proc. IEEE VTC, May 2012, pp. 1-5.
-
(2012)
Proc. IEEE VTC
, pp. 1-5
-
-
Jilani, M.1
Ohtsuki, T.2
-
26
-
-
84870499401
-
A general relaying transmission protocol for mimo secrecy communications
-
Nov
-
Z. Ding, M. Peng, and H.-H. Chen, "A general relaying transmission protocol for MIMO secrecy communications," IEEE Trans. Commun., vol. 60, no. 11, pp. 3461-3471, Nov. 2012.
-
(2012)
IEEE Trans. Commun
, vol.60
, Issue.11
, pp. 3461-3471
-
-
Ding, Z.1
Peng, M.2
Chen, H.-H.3
-
27
-
-
84555190397
-
Joint secure beamforming design at the source and the relay for an amplify-and-forward mimo untrusted relay system
-
Jan
-
C. Jeong, I.-M. Kim, and D.-I. Kim, "Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system," IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310-325, Jan. 2012.
-
(2012)
IEEE Trans. Signal Process
, vol.60
, Issue.1
, pp. 310-325
-
-
Jeong, C.1
Kim, I.-M.2
Kim, D.-I.3
-
28
-
-
84940654702
-
Secrecy capacity of independent parallel channels
-
Monticello, IL, USA, Sep
-
Z. Li, R. Yates, and W. Trappe, "Secrecy capacity of independent parallel channels," in Proc. 44th Annu. Allerton Conf., Monticello, IL, USA, Sep. 2006, pp. 841-848.
-
(2006)
Proc. 44th Annu. Allerton Conf.
, pp. 841-848
-
-
Li, Z.1
Yates, R.2
Trappe, W.3
-
29
-
-
34247359530
-
Optimal design of non-regenerative mimo wireless relays
-
Apr
-
X. Tang and Y. Hua, "Optimal design of non-regenerative MIMO wireless relays," IEEE Trans. Wireless Commun., vol. 6, no. 4, pp. 1398-1407, Apr. 2007.
-
(2007)
IEEE Trans. Wireless Commun
, vol.6
, Issue.4
, pp. 1398-1407
-
-
Tang, X.1
Hua, Y.2
-
30
-
-
34249775806
-
Linear transceiver design in nonregenerative relays with channel state information
-
DOI 10.1109/TSP.2006.890913
-
O. Munoz-Medina, J. Vidal, and A. Augustin, "Linear transceiver design in nonregenerative relays with channel state information," IEEE Trans. Signal Process., vol. 55, no. 6, pp. 2593-2604, Jun. 2007. (Pubitemid 46851627)
-
(2007)
IEEE Transactions on Signal Processing
, vol.55
, Issue.6
, pp. 2593-2604
-
-
Munoz-Medina, O.1
Vidal, J.2
Agustin, A.3
-
31
-
-
34250692167
-
Joint source and relay optimization for a non-regenerative mimo relay
-
DOI 10.1109/SAM.2006.1677195, 1677195, 2006 IEEE Sensor Array and Multichannel Signal Processing Workshop Proceedings, SAM 2006
-
Z. Fang, Y. Hua, and J. C. Koshy, "Joint source and relay optimization for a non-regenerative MIMO relay," in Proc. IEEE Workshop Sensor Array Multichannel Process., Waltham, MA, USA, Jul. 2006, pp. 239-243. (Pubitemid 46949189)
-
(2006)
2006 IEEE Sensor Array and Multichannel Signal Processing Workshop Proceedings, SAM 2006
, pp. 239-243
-
-
Fang, Z.1
Hua, Y.2
Koshy, J.C.3
-
32
-
-
70450284402
-
A unified framework for optimizing linear nonregenerative multicarrier MIMO relay communication systems
-
Dec
-
Y. Rong, X. Tang, and Y. Hua, "A unified framework for optimizing linear nonregenerative multicarrier MIMO relay communication systems," IEEE Trans. Signal Process., vol. 57, no. 12, pp. 4837-4852, Dec. 2009.
-
(2009)
IEEE Trans. Signal Process
, vol.57
, Issue.12
, pp. 4837-4852
-
-
Rong, Y.1
Tang, X.2
Hua, Y.3
-
33
-
-
79957663476
-
Optimal design of spatial source-and-relay matrices for a non-regenerative two-way MIMO relay system
-
May
-
S. Xu and Y. Hua, "Optimal design of spatial source-and-relay matrices for a non-regenerative two-way MIMO relay system," IEEE Trans. Wireless Commun., vol. 10, no. 5, pp. 1645-1655, May 2011.
-
(2011)
IEEE Trans. Wireless Commun
, vol.10
, Issue.5
, pp. 1645-1655
-
-
Xu, S.1
Hua, Y.2
-
34
-
-
0033904057
-
On the convergence of the block nonlinear Gauss-Seidel method under convex constraints
-
DOI 10.1016/S0167-6377(99)00074-7
-
L. Grippo and M. Sciandrone, "On the convergence of the block nonlinear Gauss-Seidel method under convex constraints," Oper. Res. Lett., vol. 26, no. 3, pp. 127-136, 2000. (Pubitemid 30564332)
-
(2000)
Operations Research Letters
, vol.26
, Issue.3
, pp. 127-136
-
-
Grippo, L.1
Sciandrone, M.2
|