-
1
-
-
15344350656
-
An overview of public key cryptography
-
May
-
M. E. Hellman, "An Overview of Public Key Cryptography," IEEE Commun. Mag., vol. 16, no. 6, May 2002, pp. 42-49.
-
(2002)
IEEE Commun. Mag.
, vol.16
, Issue.6
, pp. 42-49
-
-
Hellman, M.E.1
-
2
-
-
33646932650
-
A primer on cryptography in communications
-
Apr.
-
S. V. Kartalopoulos, "A Primer on Cryptography In Communications," IEEE Commun. Mag., vol. 20, no. 4, Apr. 2006, pp. 146-51.
-
(2006)
IEEE Commun. Mag.
, vol.20
, Issue.4
, pp. 146-151
-
-
Kartalopoulos, S.V.1
-
3
-
-
0016562514
-
The wire-tap channel
-
Aug.
-
A. D. Wyner, "The Wire-Tap Channel," Bell Sys. Tech. J., vol. 54, no. 8, Aug. 1975, pp. 1355-87.
-
(1975)
Bell Sys. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
4
-
-
0017996501
-
The gaussian wiretap channel
-
July
-
S. K. Leung-Yan-Cheong and M. E. Hellman, "The Gaussian Wiretap Channel," IEEE Trans. Info. Theory, vol. 24, no. 7, July 1978, pp. 451-56.
-
(1978)
IEEE Trans. Info. Theory
, vol.24
, Issue.7
, pp. 451-456
-
-
Leung-Yan-Cheong, S.K.1
Hellman, M.E.2
-
5
-
-
0032022195
-
On limits of wireless communications in a fading environment when using multiple antennas
-
Mar.
-
G. J. Foschini and M. J. Gans, "On Limits of Wireless Communications in a Fading Environment when Using Multiple Antennas," Wireless Personal Commun., vol. 6, no. 3, Mar. 1998, pp. 311-35.
-
(1998)
Wireless Personal Commun.
, vol.6
, Issue.3
, pp. 311-335
-
-
Foschini, G.J.1
Gans, M.J.2
-
6
-
-
84858300925
-
Opportunistic distributed space-time coding for decode-and-forward cooperation systems
-
Apr.
-
Y. Zou, Y.-D. Yao, and B. Zheng, "Opportunistic Distributed Space-Time Coding For Decode-And-Forward Cooperation Systems," IEEE Trans. Signal Processing, vol. 60, no. 4, Apr. 2012, pp. 1766-81.
-
(2012)
IEEE Trans. Signal Processing
, vol.60
, Issue.4
, pp. 1766-1781
-
-
Zou, Y.1
Yao, Y.-D.2
Zheng, B.3
-
7
-
-
79960996804
-
The secrecy capacity of the MIMO wiretap channel
-
Aug.
-
F. Oggier and B. Hassibi, "The Secrecy Capacity of the MIMO Wiretap Channel," IEEE Trans. Info. Theory, vol. 57, no. 8, Aug. 2011, pp. 4961-72.
-
(2011)
IEEE Trans. Info. Theory
, vol.57
, Issue.8
, pp. 4961-4972
-
-
Oggier, F.1
Hassibi, B.2
-
8
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar.
-
L. Dong et al., "Improving Wireless Physical Layer Security via Cooperating Relays," IEEE Trans. Signal Processing, vol. 58, no. 3, Mar. 2010, pp. 1875-88.
-
(2010)
IEEE Trans. Signal Processing
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
-
9
-
-
84888318377
-
Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks
-
Dec.
-
H.-M. Wang et al., "Hybrid Cooperative Beamforming and Jamming for Physical-Layer Security of Two-Way Relay Networks," IEEE Trans. Info. Forensics Sec., vol. 8, no. 12, Dec. 2013, pp. 2007-20.
-
(2013)
IEEE Trans. Info. Forensics Sec.
, vol.8
, Issue.12
, pp. 2007-2020
-
-
Wang, H.-M.1
-
10
-
-
84896912180
-
Joint physical-application layer security for wireless multimedia delivery
-
Mar.
-
L. Zhou et al., "Joint Physical-Application Layer Security for Wireless Multimedia Delivery," IEEE Commun. Mag., vol. 52, no. 3, Mar. 2014, pp. 66-72.
-
(2014)
IEEE Commun. Mag.
, vol.52
, Issue.3
, pp. 66-72
-
-
Zhou, L.1
-
11
-
-
85032751057
-
Coding for secrecy: An overview of error-control coding techniques for physical-layer security
-
Sept.
-
W. Harrison et al., "Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security," IEEE Signal Processing Mag., vol. 30, no. 5, Sept. 2013, pp. 41-50.
-
(2013)
IEEE Signal Processing Mag.
, vol.30
, Issue.5
, pp. 41-50
-
-
Harrison, W.1
-
12
-
-
84879072350
-
On physical layer security for cognitive radio networks
-
June
-
Z. Shu, Y. Qian, and S. Ci, "On Physical Layer Security for Cognitive Radio Networks," IEEE Network, vol. 27, no. 3, June 2013, pp. 28-33.
-
(2013)
IEEE Network
, vol.27
, Issue.3
, pp. 28-33
-
-
Shu, Z.1
Qian, Y.2
Ci, S.3
-
13
-
-
84891743872
-
Physical-layer security with multiuser scheduling in cognitive radio networks
-
Dec.
-
Y. Zou, X. Wang, and W. Shen, "Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks," IEEE Trans. Commun., vol. 61, no. 12, Dec. 2013, pp. 5103-13.
-
(2013)
IEEE Trans. Commun.
, vol.61
, Issue.12
, pp. 5103-5113
-
-
Zou, Y.1
Wang, X.2
Shen, W.3
-
14
-
-
45249104850
-
Wireless information-theoretic security
-
June
-
M. Bloch et al., "Wireless Information-Theoretic Security," IEEE Trans. Info. Theory, vol. 54, no. 6, June 2008, pp. 2515-34.
-
(2008)
IEEE Trans. Info. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
-
15
-
-
84884537599
-
Optimal relay selection for physical-layer security in cooperative wireless networks
-
Oct.
-
Y. Zou, X. Wang, and W. Shen, "Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks," IEEE JSAC, vol. 31, no. 10, Oct. 2013, pp. 2099-2111.
-
(2013)
IEEE JSAC
, vol.31
, Issue.10
, pp. 2099-2111
-
-
Zou, Y.1
Wang, X.2
Shen, W.3
|