-
1
-
-
84907461318
-
Principles of physical layer security in multiuser wireless networks: A survey
-
to be published
-
A. Mukherjee, S. Fakoorian, J. Huang, and A. Swindlehurst, "Principles of physical layer security in multiuser wireless networks: A survey," IEEE Commun. Surveys Tuts., to be published.
-
IEEE Commun. Surveys Tuts.
-
-
Mukherjee, A.1
Fakoorian, S.2
Huang, J.3
Swindlehurst, A.4
-
2
-
-
85032751776
-
Enhancing physical-layer secrecy in multiantenna wireless systems: An overview of signal processing approaches
-
Sep.
-
Y.-W. P. Peter Hong, P.-C. Lan, and C.-C. J. Kuo, "Enhancing physical-layer secrecy in multiantenna wireless systems: An overview of signal processing approaches," IEEE Signal Process. Mag., vol. 30, no. 5, pp. 29-40, Sep. 2013.
-
(2013)
IEEE Signal Process. Mag.
, vol.30
, Issue.5
, pp. 29-40
-
-
Peter Hong, Y.-W.P.1
Lan, P.-C.2
Kuo, C.-C.J.3
-
3
-
-
0016562514
-
The wire-tap channel
-
Oct
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
4
-
-
52349086199
-
The secrecy graph and some of its properties
-
Jul
-
M. Haenggi, "The secrecy graph and some of its properties," in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Jul. 2008, pp. 539-543.
-
(2008)
Proc IEEE Int. Symp. Inf. Theory (ISIT)
, pp. 539-543
-
-
Haenggi, M.1
-
5
-
-
84855923041
-
Secure communication in stochastic wireless networks-Part I: Connectivity
-
Feb.
-
P. C. Pinto, J. Barros, and M. Z. Win, "Secure communication in stochastic wireless networks-Part I: Connectivity," IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 125-138, Feb. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.1
, pp. 125-138
-
-
Pinto, P.C.1
Barros, J.2
Win, M.Z.3
-
6
-
-
84855911932
-
Secure communication in stochastic wireless networks-Part II: Maximum rate and collusion
-
Feb.
-
P. C. Pinto, J. Barros, and M. Z. Win, "Secure communication in stochastic wireless networks-Part II: Maximum rate and collusion," IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 139-147, Feb. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.1
, pp. 139-147
-
-
Pinto, P.C.1
Barros, J.2
Win, M.Z.3
-
7
-
-
77955697302
-
Modeling location uncertainty for eavesdroppers: A secrecy graph approach
-
Jun.
-
S. Goel, V. Aggarwal, A. Yener, and A. R. Calderbank, "Modeling location uncertainty for eavesdroppers: A secrecy graph approach," in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Jun. 2010, pp. 2627-2631.
-
(2010)
Proc IEEE Int. Symp. Inf. Theory (ISIT)
, pp. 2627-2631
-
-
Goel, S.1
Aggarwal, V.2
Yener, A.3
Calderbank, A.R.4
-
8
-
-
78651282802
-
Continuum percolation in the intrinsically secure communications graph
-
Oct.
-
P. C. Pinto and M. Z. Win, "Continuum percolation in the intrinsically secure communications graph," in Proc. Int. Symp. Inf. Theory Appl. (ISITA), Taichung, Taiwan, Oct. 2010, pp. 349-254.
-
(2010)
Proc. Int. Symp. Inf. Theory Appl. (ISITA), Taichung, Taiwan
, pp. 349-254
-
-
Pinto, P.C.1
Win, M.Z.2
-
9
-
-
79951681560
-
Secure wireless network connectivity with multi-antenna transmission
-
Feb.
-
X. Zhou, R. K. Ganti, and J. G. Andrews, "Secure wireless network connectivity with multi-antenna transmission," IEEE Trans. Wireless Commun., vol. 10, no. 2, pp. 425-430, Feb. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.2
, pp. 425-430
-
-
Zhou, X.1
Ganti, R.K.2
Andrews, J.G.3
-
10
-
-
84860255627
-
On secrecy capacity scaling in wireless networks
-
May
-
O. O. Koyluoglu, C. E. Koksal, and H. E. Gamal, "On secrecy capacity scaling in wireless networks," IEEE Trans. Inf. Theory, vol. 58, no. 5, pp. 3000-3015, May 2012.
-
(2012)
IEEE Trans. Inf. Theory
, vol.58
, Issue.5
, pp. 3000-3015
-
-
Koyluoglu, O.O.1
Koksal, C.E.2
Gamal, H.E.3
-
11
-
-
70449514137
-
Secrecy throughput of MANETs with malicious nodes
-
Jun./Jul
-
Y. Liang, H. V. Poor, and L. Ying, "Secrecy throughput of MANETs with malicious nodes," in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Seoul, Korea, Jun./Jul. 2009, pp. 1189-1193.
-
(2009)
Proc IEEE Int. Symp. Inf. Theory (ISIT), Seoul, Korea
, pp. 1189-1193
-
-
Liang, Y.1
Poor, H.V.2
Ying, L.3
-
12
-
-
78649282396
-
Security-capacity trade-off in large wireless networks using keyless secrecy
-
Sep.
-
S. Vasudevan, D. Goeckel, and D. F. Towsley, "Security-capacity trade-off in large wireless networks using keyless secrecy," in Proc. 11th ACM Int. Symp. Mobile Ad Hoc Netw. Comput. (MobiHoc), Chicago, IL, USA, Sep. 2010, pp. 21-30.
-
(2010)
Proc. 11th ACM Int. Symp. Mobile Ad Hoc Netw. Comput. (MobiHoc), Chicago, IL, USA
, pp. 21-30
-
-
Vasudevan, S.1
Goeckel, D.2
Towsley, D.F.3
-
13
-
-
84861618493
-
Secret communication in large wireless networks without eavesdropper location information
-
Mar.
-
C. Capar, D. Goeckel, B. Liu, and D. Towsley, "Secret communication in large wireless networks without eavesdropper location information," in Proc. IEEE Int. Conf. Comput. Commun. (INFOCOM), Orlando, FL, USA, Mar. 2012, pp. 11520-1160.
-
(2012)
Proc IEEE Int. Conf. Comput. Commun. (INFOCOM), Orlando, FL, USA
, pp. 11520-21160
-
-
Capar, C.1
Goeckel, D.2
Liu, B.3
Towsley, D.4
-
14
-
-
80051955278
-
Physical-layer secrecy of MIMO communications in the presence of a Poisson random field of eavesdroppers
-
Jun.
-
M. Ghogho and A. Swami, "Physical-layer secrecy of MIMO communications in the presence of a Poisson random field of eavesdroppers," in Proc. IEEE Int. Conf. Commun. Workshops (ICC), Kyoto, Japan, Jun. 2011, pp. 1-5.
-
(2011)
Proc. IEEE Int. Conf. Commun. Workshops (ICC), Kyoto, Japan
, pp. 1-5
-
-
Ghogho, M.1
Swami, A.2
-
15
-
-
84860402665
-
On the throughput cost of physical layer security in decentralized wireless networks
-
Aug.
-
X. Zhou, R. K. Ganti, J. G. Andrews, and A. Hjorungnes, "On the throughput cost of physical layer security in decentralized wireless networks," IEEE Trans. Wireless Commun., vol. 10, no. 8, pp. 2764-2775, Aug. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.8
, pp. 2764-2775
-
-
Zhou, X.1
Ganti, R.K.2
Andrews, J.G.3
Hjorungnes, A.4
-
16
-
-
84875740929
-
PHY layer security based on protected zone and artificial noise
-
May
-
N. Romero-Zurita, D. McLernon, M. Ghogho, and A. Swami, "PHY layer security based on protected zone and artificial noise," IEEE Signal Process. Lett., vol. 20, no. 5, pp. 487-490, May 2013.
-
(2013)
IEEE Signal Process. Lett.
, vol.20
, Issue.5
, pp. 487-490
-
-
Romero-Zurita, N.1
McLernon, D.2
Ghogho, M.3
Swami, A.4
-
17
-
-
84901941313
-
Physical layer security by robust masked beamforming and protected zone optimisation
-
May
-
N. Romero-Zurita, D. McLernon, and M. Ghogho, "Physical layer security by robust masked beamforming and protected zone optimisation," IET Commun., vol. 8, no. 8, pp. 1248-1257, May 2014.
-
(2014)
IET Commun.
, vol.8
, Issue.8
, pp. 1248-1257
-
-
Romero-Zurita, N.1
McLernon, D.2
Ghogho, M.3
-
18
-
-
51649110165
-
Single-Hop connectivity in interference-limited hybrid wireless networks
-
Jun
-
R. K. Ganti and M. Haenggi, "Single-Hop connectivity in interference-limited hybrid wireless networks," in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Nice, France, Jun. 2007, pp. 366-370.
-
(2007)
Proc IEEE Int. Symp. Inf. Theory (ISIT), Nice, France
, pp. 366-370
-
-
Ganti, R.K.1
Haenggi, M.2
-
19
-
-
84876765824
-
Energy-efficient repulsive cell activation for heterogeneous cellular networks
-
May
-
S.-R. Cho and W. Choi, "Energy-efficient repulsive cell activation for heterogeneous cellular networks," IEEE J. Sel. Areas Commun., vol. 31, no. 5, pp. 870-882, May 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.5
, pp. 870-882
-
-
Cho, S.-R.1
Choi, W.2
-
20
-
-
84904369444
-
Coverage and load balancing in heterogeneous cellular networks with minimum cell separation
-
to be published
-
S. Cho and W. Choi, "Coverage and load balancing in heterogeneous cellular networks with minimum cell separation," IEEE Trans. Mobile Comput., to be published.
-
IEEE Trans. Mobile Comput.
-
-
Cho, S.1
Choi, W.2
-
22
-
-
45249104850
-
Wireless information-theoretic security
-
Jun
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
24
-
-
84867619190
-
Detecting passive eavesdroppers in the MIMO wiretap channel
-
Mar.
-
A. Mukherjee and A. L. Swindlehurst, "Detecting passive eavesdroppers in the MIMO wiretap channel" in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process. (ICASSP), Kyoto, Japan, Mar. 2012, pp. 2809-2812.
-
(2012)
Proc IEEE Int. Conf. Acoust., Speech, Signal Process. (ICASSP), Kyoto, Japan
, pp. 2809-2812
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
|