-
1
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, "Communication theory of secrecy systems, " Bell system technical journal, vol. 28, no. 4, pp. 656-715, 1949.
-
(1949)
Bell System Technical Journal
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
-
3
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, "The wire-tap channel, " Bell Syst. Tech. J., vol. 54, pp. 1355-1387, 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
-
4
-
-
79951618084
-
Optimal cooperative jamming to enhance physical layer security using relays
-
G. Zheng, L.-C. Choo, and K.-K. Wong, "Optimal cooperative jamming to enhance physical layer security using relays, " IEEE Transactions on Signal Processing, vol. 59, no. 3, pp. 1317-1322, 2011.
-
(2011)
IEEE Transactions on Signal Processing
, vol.59
, Issue.3
, pp. 1317-1322
-
-
Zheng, G.1
Choo, L.-C.2
Wong, K.-K.3
-
5
-
-
70350583050
-
Relay selection for secure cooperative networks with jamming
-
I. Krikidis, J. Thompson, and S. McLaughlin, "Relay selection for secure cooperative networks with jamming, " IEEE Transactions on Wireless Communications, vol. 8, no. 10, pp. 5003-5011, 2009.
-
(2009)
IEEE Transactions on Wireless Communications
, vol.8
, Issue.10
, pp. 5003-5011
-
-
Krikidis, I.1
Thompson, J.2
McLaughlin, S.3
-
7
-
-
84870554789
-
Cooperative secure beamforming for af relay networks with multiple eavesdroppers
-
Y. Yang, Q. Li, W.-K. Ma, J. Ge, and P. Ching, "Cooperative secure beamforming for af relay networks with multiple eavesdroppers, " IEEE Signal Processing Letters, vol. 20, no. 1, pp. 35-38, 2013.
-
(2013)
IEEE Signal Processing Letters
, vol.20
, Issue.1
, pp. 35-38
-
-
Yang, Y.1
Li, Q.2
Ma, W.-K.3
Ge, J.4
Ching, P.5
-
8
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays, " IEEE Transactions on Signal Processing, vol. 58, no. 3, pp. 1875-1888, 2010.
-
(2010)
IEEE Transactions on Signal Processing
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
9
-
-
80052870842
-
On cooperative relaying schemes for wireless physical layer security
-
J. Li, A. P. Petropulu, and S. Weber, "On cooperative relaying schemes for wireless physical layer security, " IEEE Transactions on Signal Processing, vol. 59, no. 10, pp. 4985-4997, 2011.
-
(2011)
IEEE Transactions on Signal Processing
, vol.59
, Issue.10
, pp. 4985-4997
-
-
Li, J.1
Petropulu, A.P.2
Weber, S.3
-
10
-
-
77957340850
-
Opportunistic relay selection for cooperative networks with secrecy constraints
-
I. Krikidis, "Opportunistic relay selection for cooperative networks with secrecy constraints, " IET Communications, vol. 4, no. 15, pp. 1787- 1791, 2010.
-
(2010)
IET Communications
, vol.4
, Issue.15
, pp. 1787-1791
-
-
Krikidis, I.1
-
12
-
-
33645035051
-
Model selection and estimation in regression with grouped variables
-
M. Yuan and Y. Lin, "Model selection and estimation in regression with grouped variables, " Journal of the Royal Statistical Society: Series B (Statistical Methodology), vol. 68, no. 1, pp. 49-67, 2006.
-
(2006)
Journal of the Royal Statistical Society: Series B (Statistical Methodology)
, vol.68
, Issue.1
, pp. 49-67
-
-
Yuan, M.1
Lin, Y.2
-
13
-
-
84872894843
-
Joint base station clustering and beamformer design for partial coordinated transmission in heterogeneous networks
-
M. Y. Hong, R. Y. Sun, H. Baligh, and Z.-Q.Luo, "Joint base station clustering and beamformer design for partial coordinated transmission in heterogeneous networks, " IEEE Journal on Selected Areas in Communications, vol. 31, no. 2, pp. 226-240, 2013.
-
(2013)
IEEE Journal on Selected Areas in Communications
, vol.31
, Issue.2
, pp. 226-240
-
-
Hong, M.Y.1
Sun, R.Y.2
Baligh, H.3
Luo, Z.-Q.4
-
14
-
-
84880235789
-
Coordinated multipoint transmission with limited backhaul data transfer
-
J. Zhao, T. Quek, and Z. Lei, "Coordinated multipoint transmission with limited backhaul data transfer, " IEEE Transactions on Wireless Communications, vol. 12, no. 6, pp. 2762-2775, 2013.
-
(2013)
IEEE Transactions on Wireless Communications
, vol.12
, Issue.6
, pp. 2762-2775
-
-
Zhao, J.1
Quek, T.2
Lei, Z.3
-
16
-
-
77953802876
-
Secure transmission with multiple antennas i: The misome wiretap channel
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas i: The misome wiretap channel, " IEEE Transactions on Information Theory, vol. 56, no. 7, pp. 3088-3104, 2010.
-
(2010)
IEEE Transactions on Information Theory
, vol.56
, Issue.7
, pp. 3088-3104
-
-
Khisti, A.1
Wornell, G.W.2
-
17
-
-
79960996804
-
The secrecy capacity of the mimo wiretap channel
-
F. Oggier and B. Hassibi, "The secrecy capacity of the mimo wiretap channel, " IEEE Transactions on Information Theory, vol. 57, no. 8, pp. 4961-4972, 2011.
-
(2011)
IEEE Transactions on Information Theory
, vol.57
, Issue.8
, pp. 4961-4972
-
-
Oggier, F.1
Hassibi, B.2
-
18
-
-
66949180834
-
A note on the secrecy capacity of the multiantenna wiretap channel
-
T. Liu and S. Shamai, "A note on the secrecy capacity of the multiantenna wiretap channel, " IEEE Transaction on Information Theory, vol. 55, no. 6, pp. 2547C-2553C, 2009.
-
(2009)
IEEE Transaction on Information Theory
, vol.55
, Issue.6
, pp. 2547C-2553C
-
-
Liu, T.1
Shamai, S.2
|