-
1
-
-
33947169849
-
Public-key cryptography using paraunitary matrices
-
10.1109/TSP.2006.877670
-
Delgosha, F.; Fekri, F. (2006). Public-key cryptography using paraunitary matrices. IEEE Transactions on Signal Processing, 54, 3489-3504.
-
(2006)
IEEE Transactions on Signal Processing
, vol.54
, pp. 3489-3504
-
-
Delgosha, F.1
Fekri, F.2
-
2
-
-
0016562514
-
The wire-tap channel
-
10.1002/j.1538-7305.1975.tb02040.x 0316.94017 408979
-
Wyner, A. D. (1975). The wire-tap channel. Bell System Technical Journal, 54, 1355-1367.
-
(1975)
Bell System Technical Journal
, vol.54
, pp. 1355-1367
-
-
Wyner, A.D.1
-
4
-
-
0017973511
-
Broadcast channels with confidential messages
-
10.1109/TIT.1978.1055892 0382.94017 493646
-
Csiszar, I.; Korner, J. (1978). Broadcast channels with confidential messages. IEEE Transactions on Information Theory, 24, 339-348.
-
(1978)
IEEE Transactions on Information Theory
, vol.24
, pp. 339-348
-
-
Csiszar, I.1
Korner, J.2
-
5
-
-
45249119255
-
Secure communication over fading channels
-
Liang, Y.; Poor, H. V.; Shamai (Shitz), S. (2008). Secure communication over fading channels. IEEE Transactions on Information Theory, 54, 2470-2492.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, pp. 2470-2492
-
-
Liang, Y.1
Poor, H.V.2
Shamai Shitz, S.3
-
6
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
10.1109/TSP.2009.2038412 2758044
-
Dong, L.; Han, Z.; Petropulu, A. P.; Poor, H. V. (2010). Improving wireless physical layer security via cooperating relays. IEEE Transactions on Signal Processing, 58, 1875-1888.
-
(2010)
IEEE Transactions on Signal Processing
, vol.58
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
7
-
-
7244244208
-
Cooperative communication in wireless networks
-
10.1109/MCOM.2004.1341264
-
Nosratinia, A.; Hunter, T. E.; Hedayat, A. (2004). Cooperative communication in wireless networks. IEEE Communications Magazine, 42, 74-80.
-
(2004)
IEEE Communications Magazine
, vol.42
, pp. 74-80
-
-
Nosratinia, A.1
Hunter, T.E.2
Hedayat, A.3
-
8
-
-
5044252003
-
Cooperative diversity in wireless networks: Efficient protocols and outage behavior
-
10.1109/TIT.2004.838089 2103484
-
Laneman, J. N.; Tse, D. N. C.; Wornell, G. W. (2004). Cooperative diversity in wireless networks: Efficient protocols and outage behavior. IEEE Transactions on Information Theory, 50, 3062-3080.
-
(2004)
IEEE Transactions on Information Theory
, vol.50
, pp. 3062-3080
-
-
Laneman, J.N.1
Tse, D.N.C.2
Wornell, G.W.3
-
9
-
-
79955482054
-
Accurate outage analysis of incremental decode-and-forward opportunistic relaying
-
10.1109/TWC.2011.021611.100472
-
Tourki, K.; Yang, H.-C.; Alouini, M.-S. (2011). Accurate outage analysis of incremental decode-and-forward opportunistic relaying. IEEE Transactions on Wireless Communications, 10, 1021-1025.
-
(2011)
IEEE Transactions on Wireless Communications
, vol.10
, pp. 1021-1025
-
-
Tourki, K.1
Yang, H.-C.2
Alouini, M.-S.3
-
10
-
-
77957340850
-
Opportunistic relay selection for cooperative networks with secrecy constraints
-
10.1049/iet-com.2009.0634
-
Krikidis, I. (2010). Opportunistic relay selection for cooperative networks with secrecy constraints. IET Communications, 4, 1787-1791.
-
(2010)
IET Communications
, vol.4
, pp. 1787-1791
-
-
Krikidis, I.1
-
11
-
-
84878587188
-
Opportunistic selection for decode-and-forward cooperative networks with secure probabilistic constraints
-
10.1007/s11277-012-0771-7
-
Sun, X.; Xu, W.; Jiang, M.; Zhao, C. (2013). Opportunistic selection for decode-and-forward cooperative networks with secure probabilistic constraints. Wireless Personal Communications, 70, 1633-1652.
-
(2013)
Wireless Personal Communications
, vol.70
, pp. 1633-1652
-
-
Sun, X.1
Xu, W.2
Jiang, M.3
Zhao, C.4
-
12
-
-
70350583050
-
Relay selection for secure cooperative networks with jamming
-
10.1109/TWC.2009.090323
-
Krikidis, I.; Thompson, J. S.; McLaughlin, S. (2009). Relay selection for secure cooperative networks with jamming. IEEE Transactions on Wireless Communication, 8, 5003-5011.
-
(2009)
IEEE Transactions on Wireless Communication
, vol.8
, pp. 5003-5011
-
-
Krikidis, I.1
Thompson, J.S.2
McLaughlin, S.3
-
14
-
-
84863956395
-
Improving wireless security for bidirectional communication scenarios
-
10.1109/TVT.2012.2197032
-
Ding, Z.; Xu, M.; Lu, J.; Liu, F. (2012). Improving wireless security for bidirectional communication scenarios. IEEE Transactions on Vehicular Technology, 61, 2842-2848.
-
(2012)
IEEE Transactions on Vehicular Technology
, vol.61
, pp. 2842-2848
-
-
Ding, Z.1
Xu, M.2
Lu, J.3
Liu, F.4
-
15
-
-
84862635573
-
Distributed beamforming for physical-layer security of two-way relay networks
-
10.1109/TSP.2012.2191543 2943256
-
Wang, H.-M.; Yin, Q.; Xia, X.-G. (2012). Distributed beamforming for physical-layer security of two-way relay networks. IEEE Transactions on Signal Processing, 60, 3532-3545.
-
(2012)
IEEE Transactions on Signal Processing
, vol.60
, pp. 3532-3545
-
-
Wang, H.-M.1
Yin, Q.2
Xia, X.-G.3
-
17
-
-
84881040780
-
Exact outage probability of cognitive two-way relaying scheme with opportunistic relay selection under interference constraint
-
10.1049/iet-com.2012.0235 3058587
-
Duy, T. T.; Kong, H. Y. (2012). Exact outage probability of cognitive two-way relaying scheme with opportunistic relay selection under interference constraint. IET Communications, 6, 2750-2759.
-
(2012)
IET Communications
, vol.6
, pp. 2750-2759
-
-
Duy, T.T.1
Kong, H.Y.2
-
18
-
-
84881085687
-
An accurate approximation of the exponential integral function using a sum of exponentials
-
Alkheir, A.; Ibnkahla, M. (2013). An accurate approximation of the exponential integral function using a sum of exponentials. IEEE Communications Letters, 17, 1364-1367.
-
(2013)
IEEE Communications Letters
, vol.17
, pp. 1364-1367
-
-
Alkheir, A.1
Ibnkahla, M.2
|