메뉴 건너뛰기




Volumn 2015, Issue , 2015, Pages

Resource Management Based on Security Satisfaction Ratio with Fairness-Aware in Two-Way Relay Networks

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; COMPLEX NETWORKS; INTEGER PROGRAMMING; MOBILE SECURITY; NATURAL RESOURCES MANAGEMENT; NEXT GENERATION NETWORKS; PARTICLE SWARM OPTIMIZATION (PSO); RELAY CONTROL SYSTEMS; RESOURCE ALLOCATION; SECURITY OF DATA; SENSOR NODES; WIRELESS SENSOR NETWORKS;

EID: 84937019957     PISSN: 15501329     EISSN: 15501477     Source Type: Journal    
DOI: 10.1155/2015/819195     Document Type: Article
Times cited : (11)

References (23)
  • 1
    • 84937021762 scopus 로고    scopus 로고
    • Coexistence of Wi-Fi and heterogeneous small cell networks sharing unlicensed spectrum
    • H. Zhang, X. Chu, W. Guo, and S. Wang, "Coexistence of Wi-Fi and heterogeneous small cell networks sharing unlicensed spectrum, " IEEE Communications Magazine, 2014, http://www. researchgate.net/publication net/publication/268218888.
    • (2014) IEEE Communications Magazine
    • Zhang, H.1    Chu, X.2    Guo, W.3    Wang, S.4
  • 2
    • 60649099465 scopus 로고    scopus 로고
    • Distributed spacetime coding for two-way wireless relay networks
    • T. Cui, F. Gao, T. Ho, and A. Nallanathan, "Distributed spacetime coding for two-way wireless relay networks, " IEEE Transactions on Signal Processing, vol. 57, no. 2, pp. 658-671, 2009.
    • (2009) IEEE Transactions on Signal Processing , vol.57 , Issue.2 , pp. 658-671
    • Cui, T.1    Gao, F.2    Ho, T.3    Nallanathan, A.4
  • 5
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon, "Communication theory of secrecy systems, " Bell System Technical Journal, vol. 28, no. 4, pp. 656-715, 1949.
    • (1949) Bell System Technical Journal , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.E.1
  • 6
    • 70349616112 scopus 로고    scopus 로고
    • Capacity bounds for broadcast channels with confidential messages
    • J. Xu, Y. Cao, and B. Chen, "Capacity bounds for broadcast channels with confidential messages, " IEEE Transactions on InformationTheory, vol. 55, no. 10, pp. 4529-4542, 2009.
    • (2009) IEEE Transactions on InformationTheory , vol.55 , Issue.10 , pp. 4529-4542
    • Xu, J.1    Cao, Y.2    Chen, B.3
  • 7
    • 84889603798 scopus 로고    scopus 로고
    • The role of feedback in two-way secure communications
    • X. He and A. Yener, "The role of feedback in two-way secure communications, " IEEE Transactions on Information Theory, vol. 59, no. 12, pp. 8115-8130, 2013.
    • (2013) IEEE Transactions on Information Theory , vol.59 , Issue.12 , pp. 8115-8130
    • He, X.1    Yener, A.2
  • 12
    • 84904803460 scopus 로고    scopus 로고
    • Resource allocation in spectrum-sharing OFDMA femtocells with heterogeneous services
    • H. Zhang, C. Jiang, N. C. Beaulieu, X. Chu, X. Wen, and M. Tao, "Resource allocation in spectrum-sharing OFDMA femtocells with heterogeneous services, " IEEE Transactions on Communications, vol. 62, no. 7, pp. 2366-2377, 2014.
    • (2014) IEEE Transactions on Communications , vol.62 , Issue.7 , pp. 2366-2377
    • Zhang, H.1    Jiang, C.2    Beaulieu, N.C.3    Chu, X.4    Wen, X.5    Tao, M.6
  • 13
    • 19944404730 scopus 로고    scopus 로고
    • ARC: An integrated admission and rate control framework for competitive wireless CDMA data networks using noncooperative games
    • H. Lin, M. Chatterjee, S. K. Das, and K. Basu, "ARC: an integrated admission and rate control framework for competitive wireless CDMA data networks using noncooperative games, " IEEE Transactions on Mobile Computing, vol. 4, no. 3, pp. 243-257, 2005.
    • (2005) IEEE Transactions on Mobile Computing , vol.4 , Issue.3 , pp. 243-257
    • Lin, H.1    Chatterjee, M.2    Das, S.K.3    Basu, K.4
  • 14
    • 58449112187 scopus 로고    scopus 로고
    • Using binary particle swarm optimization for minimization analysis of large-scale network attack graphs
    • M. Abadi and S. Jalili, "Using binary particle swarm optimization for minimization analysis of large-scale network attack graphs, " Scientia Iranica, vol. 15, no. 6, pp. 605-619, 2008.
    • (2008) Scientia Iranica , vol.15 , Issue.6 , pp. 605-619
    • Abadi, M.1    Jalili, S.2
  • 15
  • 20
    • 84861914922 scopus 로고    scopus 로고
    • Resource allocation with subcarrier pairing in OFDMA two-way relay networks
    • H. Zhang, Y. Liu, and M. Tao, "Resource allocation with subcarrier pairing in OFDMA two-way relay networks, " IEEE Wireless Communications Letters, vol. 1, no. 2, pp. 61-64, 2012.
    • (2012) IEEE Wireless Communications Letters , vol.1 , Issue.2 , pp. 61-64
    • Zhang, H.1    Liu, Y.2    Tao, M.3
  • 21
    • 82455164331 scopus 로고    scopus 로고
    • A joint resource allocation scheme for multiuser two-way relay networks
    • G. A. S. Sidhu, F. Gao, W. Chen, and A. Nallanathan, "A joint resource allocation scheme for multiuser two-way relay networks, " IEEE Transactions on Communications, vol. 59, no. 11, pp. 2970-2975, 2011.
    • (2011) IEEE Transactions on Communications , vol.59 , Issue.11 , pp. 2970-2975
    • Sidhu, G.A.S.1    Gao, F.2    Chen, W.3    Nallanathan, A.4
  • 23


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.