-
1
-
-
1842765623
-
Topics in wireless security
-
Woo, T., Yacobi, Y.: 'Topics in wireless security', IEEE Wirel. Commun., 2004, 11, (1), pp. 6-7
-
(2004)
IEEE Wirel. Commun.
, vol.11
, Issue.1
, pp. 6-7
-
-
Woo, T.1
Yacobi, Y.2
-
2
-
-
74549186525
-
Wireless physical-layer security: the challenges ahead
-
Haiphong, Vietnam, October
-
Di Renzo,M., Debbah, M.: 'Wireless physical-layer security: the challenges ahead'. Proc. Int. Conf. on Advanced Technologies for Communications (ATC) 2009, Haiphong, Vietnam, October 2009, pp. 313-316
-
(2009)
Proc. Int. Conf. on Advanced Technologies for Communications (ATC) 2009
, pp. 313-316
-
-
Di Renzo, M.1
Debbah, M.2
-
3
-
-
80051775150
-
Power and subcarrier allocation for physical-layer security in OFDMA-based broadband wireless networks
-
Wang, X., Tao, M., Mo, J., et al.: 'Power and subcarrier allocation for physical-layer security in OFDMA-based broadband wireless networks', IEEE Trans. Inf. Forensics Sec., 2011, 6, (3), pp. 693-702
-
(2011)
IEEE Trans. Inf. Forensics Sec.
, vol.6
, Issue.3
, pp. 693-702
-
-
Wang, X.1
Tao, M.2
Mo, J.3
-
4
-
-
79955372872
-
Physical layer security in wireless networks: a tutorial
-
Shiu, Y.-S., Chang, S.Y., Wu, H.-C., et al.: 'Physical layer security in wireless networks: a tutorial', IEEE Wirel. Commun., 2011, 18, (2), pp. 66-74
-
(2011)
IEEE Wirel. Commun.
, vol.18
, Issue.2
, pp. 66-74
-
-
Shiu, Y.-S.1
Chang, S.Y.2
Wu, H.-C.3
-
5
-
-
84872099887
-
Secrecy capacity enhancement with distributed precoding in multirelay wiretap systems
-
Long, H., Xiang, W., Zhang, Y., et al.: 'Secrecy capacity enhancement with distributed precoding in multirelay wiretap systems', IEEE Trans. Inf. Forensics Sec., 2013, 8, (1), pp. 229-238
-
(2013)
IEEE Trans. Inf. Forensics Sec.
, vol.8
, Issue.1
, pp. 229-238
-
-
Long, H.1
Xiang, W.2
Zhang, Y.3
-
6
-
-
45249104850
-
Wireless information-theoretic security
-
Bloch, M., Barros, J., Rodrigues, M.R.D., et al.: 'Wireless information-theoretic security', IEEE Trans. Inf. Theory, 2008, 54, (6), pp. 2515-2534
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
-
7
-
-
0016562514
-
The wire-tap channel
-
Wyner, A.D.: 'The wire-tap channel', Bell Syst. Tech. J., 1975, 54, (8), pp. 1355-1387
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
8
-
-
0017973511
-
Broadcast channels with confidential messages
-
Csiszar, I., Korner, J.: 'Broadcast channels with confidential messages', IEEE Trans. Inf. Theory, 1978, 24, (3), pp. 339-348
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszar, I.1
Korner, J.2
-
9
-
-
0017996501
-
The Gaussian wire-tap channel
-
Leung-Yan-Cheong, S., Hellman, M.: 'The Gaussian wire-tap channel', IEEE Trans. Inf. Theory, 1978, 24, (4), pp. 451-456
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.1
Hellman, M.2
-
10
-
-
84931425598
-
Secret communications using artificial noise
-
Dallas, TX, USA, September
-
Negi, R., Goel, S.: 'Secret communications using artificial noise'. Proc. IEEE Vehicular Technology Conference (VTC), Dallas, TX, USA, September 2005, pp. 1906-1910
-
(2005)
Proc. IEEE Vehicular Technology Conference (VTC)
, pp. 1906-1910
-
-
Negi, R.1
Goel, S.2
-
11
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
Goel, S., Negi, R.: 'Guaranteeing secrecy using artificial noise', IEEE Trans. Wirel. Commun., 2008, 7, (6), pp. 2180-2189
-
(2008)
IEEE Trans. Wirel. Commun.
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
12
-
-
84940659555
-
Achievable rates for the general Gaussian multiple access wire-tap channel with collective secrecy
-
on Communication, Control, and Computing (ACCCC), Monticello, IL, USA, September
-
Tekin, E., Yener, A.: 'Achievable rates for the general Gaussian multiple access wire-tap channel with collective secrecy'. Proc. Allerton Conf. on Communication, Control, and Computing (ACCCC), Monticello, IL, USA, September 2006, pp. 1-8
-
(2006)
Proc. Allerton Conf.
, pp. 1-8
-
-
Tekin, E.1
Yener, A.2
-
13
-
-
84881606200
-
Cooperative jamming and power allocation in three-phase two-way relaying wiretap systems
-
Shanghai, China, April 2013
-
Long, H., Xiang, W., Wang, J., et al.: 'Cooperative jamming and power allocation in three-phase two-way relaying wiretap systems'. Proc. IEEE Wireless Communications and Networking Conf. (WCNC) 2013, Shanghai, China, April 2013, pp. 4216-4220
-
(2013)
Proc. IEEE Wireless Communications and Networking Conf. (WCNC)
, pp. 4216-4220
-
-
Long, H.1
Xiang, W.2
Wang, J.3
-
14
-
-
70350583050
-
Relay selection for secure cooperative networks with jamming
-
Krikidis, I., Thompson, J., Mclaughlin, S.: 'Relay selection for secure cooperative networks with jamming', IEEE Trans. Wirel. Commun., 2009, 8, (10), pp. 5003-5011
-
(2009)
IEEE Trans. Wirel. Commun.
, vol.8
, Issue.10
, pp. 5003-5011
-
-
Krikidis, I.1
Thompson, J.2
Mclaughlin, S.3
-
15
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Dong, L., Han, Z., Petropulu, A.P., et al.: 'Improving wireless physical layer security via cooperating relays', IEEE Trans. Signal Process., 2010, 58, (3), part 2, pp. 1875-1888
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
-
16
-
-
80052174337
-
Distributed coalition formation of relay and friendly jammers for secure cooperative networks
-
Kyoto, Japan, June
-
Zhang, R., Song, L., Han, Z., et al.: 'Distributed coalition formation of relay and friendly jammers for secure cooperative networks'. Proc. IEEE Int. Conf. on Communications (ICC), Kyoto, Japan, June 2011, pp. 1-6
-
(2011)
Proc. IEEE Int. Conf. on Communications (ICC)
, pp. 1-6
-
-
Zhang, R.1
Song, L.2
Han, Z.3
-
17
-
-
39349091874
-
Shout to secure: physical-layer wireless security with known interference
-
Washington, DC, November
-
Jorgensen, M.L., Yanakiev, B.R., Kirkelund, G.E., et al.: 'Shout to secure: physical-layer wireless security with known interference'. Proc. IEEE Global Telecommunication Conf. 2007, Washington, DC, November 2007, pp. 33-38
-
(2007)
Proc. IEEE Global Telecommunication Conf. 2007
, pp. 33-38
-
-
Jorgensen, M.L.1
Yanakiev, B.R.2
Kirkelund, G.E.3
-
18
-
-
79551634548
-
Physical layer security for two way relay communications with friendly jammers
-
Miami, FL, December 2010
-
Zhang, R., Song, L., Han, Z., et al.: 'Physical layer security for two way relay communications with friendly jammers'. Proc. IEEE Globecom 2010, Miami, FL, December 2010, pp. 1-6
-
(2010)
Proc. IEEE Globecom
, pp. 1-6
-
-
Zhang, R.1
Song, L.2
Han, Z.3
-
19
-
-
80052157752
-
Cooperative jamming and power allocation for wireless relay networks in presence of eavesdropper
-
Kyoto, Japan, June
-
Dong, L., Yousefi'zadeh, H., Jafarkhani, H.: 'Cooperative jamming and power allocation for wireless relay networks in presence of eavesdropper'. Proc. IEEE Int. Conf. on Communications (ICC), Kyoto, Japan, June 2011, pp. 1-5
-
(2011)
Proc. IEEE Int. Conf. on Communications (ICC)
, pp. 1-5
-
-
Dong, L.1
Yousefi'zadeh, H.2
Jafarkhani, H.3
-
20
-
-
79951935724
-
Power allocation for cooperative-based jamming in wireless networks with secrecy constraints
-
Miami, Fl, USA, December
-
Krikidis, I., Thompson, J.S., Grant, P.M., et al.: 'Power allocation for cooperative-based jamming in wireless networks with secrecy constraints'. Proc. IEEE Global Telecommunications Conf. (GLOBECOM 2010) Workshops, Miami, Fl, USA, December 2010, pp. 1177-1181
-
(2010)
Proc. IEEE Global Telecommunications Conf. (GLOBECOM 2010) Workshops
, pp. 1177-1181
-
-
Krikidis, I.1
Thompson, J.S.2
Grant, P.M.3
-
21
-
-
45249101530
-
The general Gaussian multiple access and two-way wire-tap channels: achievable rates and cooperative jamming
-
Tekin, E., Yener, A.: 'The general Gaussian multiple access and two-way wire-tap channels: achievable rates and cooperative jamming', IEEE Trans. Inf. Theory, 2008, 54, (6), pp. 2735-2751
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
22
-
-
51349109773
-
The relay-eavesdropper channel: cooperation for secrecy
-
Lai, L., El Gamal, H.: 'The relay-eavesdropper channel: cooperation for secrecy', IEEE Trans. Inf. Theory, 2008, 54, (9), pp. 4005-4019
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.9
, pp. 4005-4019
-
-
Lai, L.1
El Gamal, H.2
-
23
-
-
79955491895
-
Interference-assisted secret communication
-
Tang, X., Liu, R., Spasojevic, P., et al.: 'Interference-assisted secret communication', IEEE Trans. Inf. Theory, 2011, 57, (5), pp. 3153-3167
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.5
, pp. 3153-3167
-
-
Tang, X.1
Liu, R.2
Spasojevic, P.3
-
24
-
-
80051727482
-
Strongly secure communications over the two-way wiretap channel
-
Pierrot, A.J., Bloch, M.R.: 'Strongly secure communications over the two-way wiretap channel', IEEE Trans. Inf. Forensics Sec., 2011, 6, (3), part 1, pp. 595-605
-
(2011)
IEEE Trans. Inf. Forensics Sec.
, vol.6
, Issue.3
, pp. 595-605
-
-
Pierrot, A.J.1
Bloch, M.R.2
-
25
-
-
41849091900
-
Secure communications via cooperating base stations
-
Simeone, O., Popovski, P.: 'Secure communications via cooperating base stations', IEEE Commun. Lett., 2008, 12, (3), pp. 188-190
-
(2008)
IEEE Commun. Lett.
, vol.12
, Issue.3
, pp. 188-190
-
-
Simeone, O.1
Popovski, P.2
-
26
-
-
67649499991
-
Wireless secrecy in cellular systems with infrastructure-aided cooperation
-
Popovski, P., Simeone, O.: 'Wireless secrecy in cellular systems with infrastructure-aided cooperation', IEEE Trans. Inf. Forensics Sec., 2009, 4, (2), pp. 242-256
-
(2009)
IEEE Trans. Inf. Forensics Sec.
, vol.4
, Issue.2
, pp. 242-256
-
-
Popovski, P.1
Simeone, O.2
-
27
-
-
84856104619
-
Recruiting multi-antenna transmitters as cooperative jammers: an auction-theoretic approach
-
on Communication, Control, and Computing (Allerton), Monticello, IL, USA, September
-
Stanojev, I., Yener, A.: 'Recruiting multi-antenna transmitters as cooperative jammers: an auction-theoretic approach'. Proc. Annual Allerton Conf. on Communication, Control, and Computing (Allerton), Monticello, IL, USA, September 2011, pp. 1106-1112
-
(2011)
Proc. Annual Allerton Conf.
, pp. 1106-1112
-
-
Stanojev, I.1
Yener, A.2
-
28
-
-
79960578903
-
Cooperative jamming via spectrum leasing
-
on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), Princeton, NJ, USA, May
-
Stanojev, I., Yener, A.: 'Cooperative jamming via spectrum leasing'. Proc. Int. Symp. on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), Princeton, NJ, USA, May 2011, pp. 265-272
-
(2011)
Proc. Int. Symp.
, pp. 265-272
-
-
Stanojev, I.1
Yener, A.2
-
29
-
-
84861601537
-
Physical layer security from inter-session interference in large wireless networks
-
Orlando, FL, USA, March
-
Sheikholeslami, A., Goeckel, D., Pishro-Nik, H., et al.: 'Physical layer security from inter-session interference in large wireless networks'. Proc. IEEE INFOCOM, Orlando, FL, USA, March 2012, pp. 1179-1187
-
(2012)
Proc. IEEE INFOCOM
, pp. 1179-1187
-
-
Sheikholeslami, A.1
Goeckel, D.2
Pishro-Nik, H.3
-
30
-
-
67249087217
-
Two-hop secure communication using an untrusted relay: a case for cooperative jamming
-
New Orleans, LA, USA, December 2008
-
He, X., Yener, A.: 'Two-hop secure communication using an untrusted relay: a case for cooperative jamming'. Proc. IEEE GLOBECOM 2008, New Orleans, LA, USA, December 2008, pp. 1-5
-
(2008)
Proc. IEEE GLOBECOM
, pp. 1-5
-
-
He, X.1
Yener, A.2
-
31
-
-
79551619462
-
Secure communications via cooperative jamming in two-hop relay systems
-
Miami, FL, December
-
Huang, J., Swindlehurst, A.L.: 'Secure communications via cooperative jamming in two-hop relay systems'. Proc. IEEE Global Telecommunications Conference (GLOBECOM 2010), Miami, FL, December 2010, pp. 1-5
-
(2010)
Proc. IEEE Global Telecommunications Conference (GLOBECOM 2010)
, pp. 1-5
-
-
Huang, J.1
Swindlehurst, A.L.2
-
32
-
-
84861311131
-
Joint decode-and-forward and jamming for wireless physical layer security with destination assistance
-
Systems and Computers (ASILOMAR), Pacific Grove, CA, USA, November
-
Liu, Y., Petropulu, A.P., Poor, H.V.: 'Joint decode-and-forward and jamming for wireless physical layer security with destination assistance'. Proc. Asilomar Conf. on Signals, Systems and Computers (ASILOMAR), Pacific Grove, CA, USA, November 2011, pp. 109-113
-
(2011)
Proc. Asilomar Conf. on Signals
, pp. 109-113
-
-
Liu, Y.1
Petropulu, A.P.2
Poor, H.V.3
-
33
-
-
82055177123
-
Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks
-
Goeckel, D., Vasudevan, S., Towsley, D., et al.: 'Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks', IEEE J. Sel. Areas Commun., 2011, 29, (10), pp. 2067-2076
-
(2011)
IEEE J. Sel. Areas Commun.
, vol.29
, Issue.10
, pp. 2067-2076
-
-
Goeckel, D.1
Vasudevan, S.2
Towsley, D.3
-
34
-
-
80052165426
-
Joint relay and jammer selection for secure two-way relay networks
-
Kyoto, Japan, June
-
Chen, J., Zhang, R., Song, L., et al.: 'Joint relay and jammer selection for secure two-way relay networks'. Proc. IEEE Int. Conf. on Communications (ICC), Kyoto, Japan, June 2011, pp. 1-5
-
(2011)
Proc. IEEE Int. Conf. on Communications (ICC)
, pp. 1-5
-
-
Chen, J.1
Zhang, R.2
Song, L.3
-
35
-
-
84863152970
-
Joint relay and jammer selection for secure decode-and-forward two-way relay communications
-
(GLOBECOM 2011), Houston, TX, December
-
Chen, J., Song, L., Han, Z., et al.: 'Joint relay and jammer selection for secure decode-and-forward two-way relay communications'. Proc. IEEE Global Telecommunications Conf. (GLOBECOM 2011), Houston, TX, December 2011, pp. 1-5
-
(2011)
Proc. IEEE Global Telecommunications Conf.
, pp. 1-5
-
-
Chen, J.1
Song, L.2
Han, Z.3
-
36
-
-
84863956395
-
Improving wireless security for bidirectional communication scenarios
-
Ding, Z., Xu, M., Lu, J., et al.: 'Improving wireless security for bidirectional communication scenarios', IEEE Trans. Veh. Technol., 2012, 61, (6), pp. 2842-2848
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.6
, pp. 2842-2848
-
-
Ding, Z.1
Xu, M.2
Lu, J.3
-
37
-
-
84862963131
-
Joint relay and jammer selection for secure two-way relay networks
-
Chen, J., Zhang, R., Song, L., et al.: 'Joint relay and jammer selection for secure two-way relay networks', IEEE Trans. Inf. Forensics Sec., 2012, 7, (1), part 2, pp. 310-320
-
(2012)
IEEE Trans. Inf. Forensics Sec.
, vol.7
, Issue.1
, pp. 310-320
-
-
Chen, J.1
Zhang, R.2
Song, L.3
|