-
1
-
-
85032751357
-
Cooperative security at the physical layer: A summary of recent advances
-
Bassily R, Ekrem E, He X, Tekin E, Xie J, Bloch MR, Ulukus S, Yener A,. Cooperative security at the physical layer: a summary of recent advances. IEEE Signal Processing Magazine 2013; 30 (5): 16-28.
-
(2013)
IEEE Signal Processing Magazine
, vol.30
, Issue.5
, pp. 16-28
-
-
Bassily, R.1
Ekrem, E.2
He, X.3
Tekin, E.4
Xie, J.5
Bloch, M.R.6
Ulukus, S.7
Yener, A.8
-
2
-
-
84856271363
-
On the application of cooperative transmission to secrecy communications
-
Ding Z, Leung K, Geoeckel D, Towsley D,. On the application of cooperative transmission to secrecy communications. IEEE Journal on Selected Areas in Communication 2012; 30 (2): 359-368.
-
(2012)
IEEE Journal on Selected Areas in Communication
, vol.30
, Issue.2
, pp. 359-368
-
-
Ding, Z.1
Leung, K.2
Geoeckel, D.3
Towsley, D.4
-
4
-
-
84931425598
-
Secret communication using artificial noise
-
Goel S, Negi R,. Secret communication using artificial noise. Proc. 2005 IEEE Veh. Technol. Conf.-Fall, vol. 3, Dallas, Texas, USA, September 2005; 1906-1910.
-
(2005)
Proc. 2005 IEEE Veh. Technol. Conf. - Fall, 3, Dallas, Texas, USA, September
, pp. 1906-1910
-
-
Goel, S.1
Negi, R.2
-
5
-
-
79955491895
-
Interference assisted secret communication
-
Tang X, Liu R, Spasojevic P, Poor VC,. Interference assisted secret communication. IEEE Transactions on Information Theory 2011; 57 (5): 3153-3167.
-
(2011)
IEEE Transactions on Information Theory
, vol.57
, Issue.5
, pp. 3153-3167
-
-
Tang, X.1
Liu, R.2
Spasojevic, P.3
Poor, V.C.4
-
6
-
-
77957340850
-
Opportunistic relay selection for cooperative networks with secrecy constraints
-
Krididis I,. Opportunistic relay selection for cooperative networks with secrecy constraints. IET Communications 2010; 4 (15): 1787-1791.
-
(2010)
IET Communications
, vol.4
, Issue.15
, pp. 1787-1791
-
-
Krididis, I.1
-
7
-
-
80052157752
-
Cooperative jamming and power allocation for wireless relay networks in presence of eavesdropper
-
Dong L, Yousefi'za deh H, Jafarkhani H,. Cooperative jamming and power allocation for wireless relay networks in presence of eavesdropper. Proceedings of ICC 2011, Kyoto, Japan, 2011; 1-5.
-
(2011)
Proceedings of ICC 2011, Kyoto, Japan
, pp. 1-5
-
-
Dong, L.1
Yousefi'Za Deh, H.2
Jafarkhani, H.3
-
8
-
-
84866730731
-
Energy efficiency of cooperative jamming strategies in secure wireless networks
-
Dehghan M, Goeckel D, Ghaderi M, Ding Z,. Energy efficiency of cooperative jamming strategies in secure wireless networks. IEEE Transactions on Wireless Communications 2012; 11 (9): 3025-3029.
-
(2012)
IEEE Transactions on Wireless Communications
, vol.11
, Issue.9
, pp. 3025-3029
-
-
Dehghan, M.1
Goeckel, D.2
Ghaderi, M.3
Ding, Z.4
-
9
-
-
84874906565
-
Deaf cooperation and relay selection strategies for secure communication in multiple relay networks
-
Bassily R, Ulukus S,. Deaf cooperation and relay selection strategies for secure communication in multiple relay networks. IEEE Transactions on Signal Processing 2013; 61 (6): 1544-1554.
-
(2013)
IEEE Transactions on Signal Processing
, vol.61
, Issue.6
, pp. 1544-1554
-
-
Bassily, R.1
Ulukus, S.2
-
10
-
-
84883380753
-
On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming
-
Park K, Wang T, Alouini MS,. On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming. IEEE Journal on Selected Areas in Communications 2013; 31 (9): 1741-1750.
-
(2013)
IEEE Journal on Selected Areas in Communications
, vol.31
, Issue.9
, pp. 1741-1750
-
-
Park, K.1
Wang, T.2
Alouini, M.S.3
-
12
-
-
84878739878
-
Decode-and-forward relay beamforming for secrecy with finite-alphabet input
-
Vishwakarma S, Chockalingam A,. Decode-and-forward relay beamforming for secrecy with finite-alphabet input. IEEE Communications Letters 2013; 17 (5): 912-915.
-
(2013)
IEEE Communications Letters
, vol.17
, Issue.5
, pp. 912-915
-
-
Vishwakarma, S.1
Chockalingam, A.2
-
13
-
-
84856425241
-
Amplify-and-forward selection cooperation over rayleigh fading channels with imperfect CSI
-
Seyfi M, Muhaidat S, Jie L,. Amplify-and-forward selection cooperation over rayleigh fading channels with imperfect CSI. IEEE Transactions on Wireless Communications 2012; 11 (1): 199-209.
-
(2012)
IEEE Transactions on Wireless Communications
, vol.11
, Issue.1
, pp. 199-209
-
-
Seyfi, M.1
Muhaidat, S.2
Jie, L.3
-
14
-
-
84929654452
-
Achievable rate region with secrecy constraints for secure communication in two-way relay networks
-
Yang Y, Wang W, Zhao H,. Achievable rate region with secrecy constraints for secure communication in two-way relay networks. International Journal of Communication Systems 2013; 18 (9).
-
(2013)
International Journal of Communication Systems
, vol.18
, Issue.9
-
-
Yang, Y.1
Wang, W.2
Zhao, H.3
-
15
-
-
45249083184
-
Secure communication with a relay helping the wire-tapper
-
Yuksel M, Erkip E,. Secure communication with a relay helping the wire-tapper. Proc. Information Theory Workshop, Dublin, Ireland, September 2007; 595-600.
-
(2007)
Proc. Information Theory Workshop, Dublin, Ireland, September
, pp. 595-600
-
-
Yuksel, M.1
Erkip, E.2
|