-
1
-
-
84890522850
-
Communication theory of secrecy systems
-
Oct
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, no. 8, pp. 656-715, Oct. 1949
-
(1949)
Bell Syst. Tech. J
, vol.28
, Issue.8
, pp. 656-715
-
-
Shannon, C.E.1
-
2
-
-
0016562514
-
The wire-Tap channel
-
Oct
-
A. D. Wyner, "The wire-Tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975
-
(1975)
Bell Syst. Tech. J
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
3
-
-
5044252003
-
Cooperative diversity in wireless networks: Efficient protocols and outage behavior
-
Dec
-
J. N. Laneman, D. N. C. Tse, and G.W.Wornell, "Cooperative diversity in wireless networks: Efficient protocols and outage behavior," IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3062-3080, Dec. 2004
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.12
, pp. 3062-3080
-
-
Laneman, J.N.1
Tse, D.N.C.2
Wornell, G.W.3
-
4
-
-
84863044084
-
Opportunistic cooperative networking: To relay or not to relay?
-
Feb
-
X. Gong, T. P. S. Chandrashekhar, J. Zhang, and H. V. Poor, "Opportunistic cooperative networking: To relay or not to relay?" IEEE J. Sel. Areas Commun., vol. 30, no. 2, pp. 1-9, Feb. 2012
-
(2012)
IEEE J. Sel. Areas Commun
, vol.30
, Issue.2
, pp. 1-9
-
-
Gong, X.1
Chandrashekhar, T.P.S.2
Zhang, J.3
Poor, H.V.4
-
5
-
-
84869429781
-
Two-hop opportunistic scheduling in cooperative cellular networks
-
Nov
-
J. Kim, J. Lee, K. Son, S. Song, and S. Chong, "Two-hop opportunistic scheduling in cooperative cellular networks," IEEE Trans. Veh. Technol., vol. 61, no. 9, pp. 4194-4199, Nov. 2012
-
(2012)
IEEE Trans. Veh. Technol
, vol.61
, Issue.9
, pp. 4194-4199
-
-
Kim, J.1
Lee, J.2
Son, K.3
Song, S.4
Chong, S.5
-
6
-
-
7544225775
-
Exact symbol error probability of a cooperative network in a Rayleigh-fading environment
-
Sep
-
P. A. Anghel and M. Kaveh, "Exact symbol error probability of a cooperative network in a Rayleigh-fading environment," IEEE Trans. Wireless Commun., vol. 3, no. 5, pp. 1416-1421, Sep. 2004
-
(2004)
IEEE Trans. Wireless Commun
, vol.3
, Issue.5
, pp. 1416-1421
-
-
Anghel, P.A.1
Kaveh, M.2
-
7
-
-
11844274674
-
A performance study of dual-hop transmissions with fixed gain relays
-
Nov
-
M. O. Hasna and M.-S. Alouini, "A performance study of dual-hop transmissions with fixed gain relays," IEEE Trans. Wireless Commun., vol. 3, no. 6, pp. 1963-1968, Nov. 2004
-
(2004)
IEEE Trans. Wireless Commun
, vol.3
, Issue.6
, pp. 1963-1968
-
-
Hasna, M.O.1
Alouini, M.-S.2
-
8
-
-
34249313010
-
Tracing malicious relays in cooperative wireless communications
-
Jun
-
Y. Mao and M. Wu, "Tracing malicious relays in cooperative wireless communications," IEEE Trans. Inf. Forensics Security, vol. 2, no. 2, pp. 198-212, Jun. 2007
-
(2007)
IEEE Trans. Inf. Forensics Security
, vol.2
, Issue.2
, pp. 198-212
-
-
Mao, Y.1
Wu, M.2
-
9
-
-
77954584734
-
Cooperation with an untrusted relay: A secrecy perspective
-
Aug
-
X. He and A. Yener, "Cooperation with an untrusted relay: A secrecy perspective," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3807-3827, Aug. 2010
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.8
, pp. 3807-3827
-
-
He, X.1
Yener, A.2
-
10
-
-
84877718412
-
Secure communication via an untrusted non-regenerative relay in fading channels
-
May
-
J. Huang, A. Mukherjee, and A. L. Swindlehurst, "Secure communication via an untrusted non-regenerative relay in fading channels," IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2536-2550, May 2013
-
(2013)
IEEE Trans. Signal Process
, vol.61
, Issue.10
, pp. 2536-2550
-
-
Huang, J.1
Mukherjee, A.2
Swindlehurst, A.L.3
-
11
-
-
84555190397
-
Joint secure beamforming design at the source and the relay for an amplify-And-forward MIMO untrusted relay system
-
Jan
-
C. Jeong, I.-M. Kim, and D. I. Kim, "Joint secure beamforming design at the source and the relay for an amplify-And-forward MIMO untrusted relay system," IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310-325, Jan. 2012
-
(2012)
IEEE Trans. Signal Process
, vol.60
, Issue.1
, pp. 310-325
-
-
Jeong, C.1
Kim, I.-M.2
Kim, D.I.3
-
12
-
-
84891634602
-
Link adaptation with untrusted relay assignment: Design and performance analysis
-
Dec
-
H. Khodakarami and F. Lahouti, "Link adaptation with untrusted relay assignment: Design and performance analysis," IEEE Trans. Commun., vol. 61, no. 2, pp. 4874-4883, Dec. 2013
-
(2013)
IEEE Trans. Commun
, vol.61
, Issue.2
, pp. 4874-4883
-
-
Khodakarami, H.1
Lahouti, F.2
-
13
-
-
74549179778
-
Hard/soft detection with limited CSI for multi-hop systems
-
Jul
-
M. Malkawi and I.-M. Kim, "Hard/soft detection with limited CSI for multi-hop systems," IEEE Trans. Wireless Commun., vol. 8, no. 7, pp. 3435-3441, Jul. 2009
-
(2009)
IEEE Trans. Wireless Commun
, vol.8
, Issue.7
, pp. 3435-3441
-
-
Malkawi, M.1
Kim, I.-M.2
-
14
-
-
0003498504
-
-
6th ed. San Diego, CA, USA: Academic
-
I. S. Gradshteyn and I.M. Ryzhik, Table of Integrals, Series and Products, 6th ed. San Diego, CA, USA: Academic, 2000
-
(2000)
Table of Integrals, Series and Products
-
-
Gradshteyn, I.S.1
Ryzhik, I.M.2
|