-
1
-
-
33847634697
-
On capacity under receive and spatial spectrum-sharing constraints
-
Feb.
-
M. Gastpar, "On capacity under receive and spatial spectrum-sharing constraints," IEEE Trans. Inf. Theory, vol. 53, no. 2, pp. 471-487, Feb. 2007.
-
(2007)
IEEE Trans. Inf. Theory
, vol.53
, Issue.2
, pp. 471-487
-
-
Gastpar, M.1
-
2
-
-
67349259569
-
Breaking spectrum gridlock with cognitive radios: An information theoretic perspective
-
May
-
A. Goldsmith, S. Jafar, I. Maric, and S. Srinivasa, "Breaking spectrum gridlock with cognitive radios: An information theoretic perspective," Proc. IEEE, vol. 97, no. 5, pp. 894-914, May 2009.
-
(2009)
Proc IEEE
, vol.97
, Issue.5
, pp. 894-914
-
-
Goldsmith, A.1
Jafar, S.2
Maric, I.3
Srinivasa, S.4
-
3
-
-
79960399745
-
Robust beamforming for security in MIMO wiretap channels with imperfect CSI
-
Jan.
-
A. Mukherjee and A. L. Swindlehurst, "Robust beamforming for security in MIMO wiretap channels with imperfect CSI," IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351-361, Jan. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.1
, pp. 351-361
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
4
-
-
80052889357
-
Cooperative jamming for secure communications in MIMO relay networks
-
Oct.
-
J. Huang and A. L. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 4871-4884
-
-
Huang, J.1
Swindlehurst, A.L.2
-
5
-
-
84858162419
-
Information and inference in the wireless physical layer
-
Feb.
-
H. V. Poor, "Information and inference in the wireless physical layer," IEEE Wireless Commun., vol. 19, no. 1, pp. 40-47, Feb. 2012.
-
(2012)
IEEE Wireless Commun.
, vol.19
, Issue.1
, pp. 40-47
-
-
Poor, H.V.1
-
6
-
-
79956205910
-
Maximal ratio diversity combining enhanced security
-
May
-
F. He, H. Man, and W. Wang, "Maximal ratio diversity combining enhanced security," IEEE Commun. Lett., vol. 15, no. 5, pp. 509-511, May 2011.
-
(2011)
IEEE Commun. Lett.
, vol.15
, Issue.5
, pp. 509-511
-
-
He, F.1
Man, H.2
Wang, W.3
-
7
-
-
80051744719
-
On wireless channels with M-antenna eavesdroppers: Characterization of the outage probability and ε-outage secrecy capacity
-
Sep.
-
V. U. Prabhu and M. R. D. Rodrigues, "On wireless channels with M-antenna eavesdroppers: Characterization of the outage probability and ε-outage secrecy capacity," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 853-860, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 853-860
-
-
Prabhu, V.U.1
Rodrigues, M.R.D.2
-
8
-
-
84860863805
-
Performance of transmit antenna selection physical layer security schemes
-
Jan.
-
H. Alves, R. D. Souza, M. Debbah, and M. Bennis, "Performance of transmit antenna selection physical layer security schemes," IEEE Signal Process. Lett., vol. 19, no. 6, pp. 372-375, Jan. 2012.
-
(2012)
IEEE Signal Process. Lett.
, vol.19
, Issue.6
, pp. 372-375
-
-
Alves, H.1
Souza, R.D.2
Debbah, M.3
Bennis, M.4
-
9
-
-
84873731253
-
Transmit antenna selection for security enhancement in MIMO wiretap channels
-
Jan.
-
N. Yang, P. L. Yeoh, M. Elkashlan, R. Schober, and I. B. Collings, "Transmit antenna selection for security enhancement in MIMO wiretap channels," IEEE Trans. Commun., vol. 61, no. 1, pp. 144-154, Jan. 2013.
-
(2013)
IEEE Trans. Commun.
, vol.61
, Issue.1
, pp. 144-154
-
-
Yang, N.1
Yeoh, P.L.2
Elkashlan, M.3
Schober, R.4
Collings, I.B.5
-
10
-
-
84877718412
-
Secure communication via an untrusted non-regenerative relay in fading channels
-
May
-
J. Huang, A. Mukherjee, and A. L. Swindlehurst, "Secure communication via an untrusted non-regenerative relay in fading channels," IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2536-2550, May 2013.
-
(2013)
IEEE Trans. Signal Process.
, vol.61
, Issue.10
, pp. 2536-2550
-
-
Huang, J.1
Mukherjee, A.2
Swindlehurst, A.L.3
-
11
-
-
77951274829
-
Secure communication over MISO cognitive radio channels
-
Apr.
-
Y. Pei, Y.-C. Liang, L. Zhang, K. C. Teh, and K. H. Li, "Secure communication over MISO cognitive radio channels," IEEE Trans. Wireless Commun., vol. 9, no. 4, pp. 1494-1502, Apr. 2010.
-
(2010)
IEEE Trans. Wireless Commun.
, vol.9
, Issue.4
, pp. 1494-1502
-
-
Pei, Y.1
Liang, Y.-C.2
Zhang, L.3
Teh, K.C.4
Li, K.H.5
-
12
-
-
79952680469
-
Secure communication in multiantenna cognitive radio networks with imperfect channel state information
-
Apr.
-
Y. Pei, Y.-C. Liang, K. C. Teh, and K. H. Li, "Secure communication in multiantenna cognitive radio networks with imperfect channel state information," IEEE Trans. Signal Process., vol. 59, no. 4, pp. 1683-1693, Apr. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.4
, pp. 1683-1693
-
-
Pei, Y.1
Liang, Y.-C.2
Teh, K.C.3
Li, K.H.4
-
13
-
-
79957830810
-
Secure relay beamforming over cognitive radio channels
-
Baltimore, MD, USA, Mar.
-
J. Zhang and M. C. Gursoy, "Secure relay beamforming over cognitive radio channels," in Proc 45th Annu. CISS, Baltimore, MD, USA, Mar. 2011, pp. 1-5.
-
(2011)
Proc 45th Annu. CISS
, pp. 1-5
-
-
Zhang, J.1
Gursoy, M.C.2
-
14
-
-
84891556599
-
Proposed relay selection scheme for physical layer security in cognitive radio networks
-
Nov.
-
H. Sakran, M. Shokair, O. Nasr, S. El-Rabaie, and A. A. El-Azm, "Proposed relay selection scheme for physical layer security in cognitive radio networks," IET Commun., vol. 6, no. 16, pp. 2676-2687, Nov. 2012.
-
(2012)
IET Commun.
, vol.6
, Issue.16
, pp. 2676-2687
-
-
Sakran, H.1
Shokair, M.2
Nasr, O.3
El-Rabaie, S.4
El-Azm, A.A.5
-
15
-
-
84877667488
-
Secure communications with untrusted secondary users in cognitive radio networks
-
Anaheim, CA, USA, Dec.
-
H. Jeon, S. W. McLaughlin, and J. Ha, "Secure communications with untrusted secondary users in cognitive radio networks," in Proc IEEE GLOBECOM, Anaheim, CA, USA, Dec. 2012, pp. 1072-1078.
-
(2012)
Proc IEEE GLOBECOM
, pp. 1072-1078
-
-
Jeon, H.1
McLaughlin, S.W.2
Ha, J.3
-
16
-
-
80051757604
-
An information secrecy game in cognitive radio networks
-
Sep.
-
Y. Wu and K. J. R. Liu, "An information secrecy game in cognitive radio networks," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 831-842, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 831-842
-
-
Wu, Y.1
Liu, K.J.R.2
-
17
-
-
84873097542
-
Improving secrecy rate via spectrum leasing for friendly jamming
-
Jan.
-
I. Stanojev and A. Yener, "Improving secrecy rate via spectrum leasing for friendly jamming," IEEE Trans. Wireless Commun., vol. 12, no. 1, pp. 134-145, Jan. 2013.
-
(2013)
IEEE Trans. Wireless Commun.
, vol.12
, Issue.1
, pp. 134-145
-
-
Stanojev, I.1
Yener, A.2
-
18
-
-
24644476931
-
Analysis of transmit antenna selection/maximal-ratio combining in Rayleigh fading channels
-
Jul.
-
Z. Chen, J. Yuan, and B. Vucetic, "Analysis of transmit antenna selection/maximal-ratio combining in Rayleigh fading channels," IEEE Trans. Veh. Technol., vol. 54, no. 4, pp. 1312-1321, Jul. 2005.
-
(2005)
IEEE Trans. Veh. Technol.
, vol.54
, Issue.4
, pp. 1312-1321
-
-
Chen, Z.1
Yuan, J.2
Vucetic, B.3
-
19
-
-
45249104850
-
Wireless information-theoretic security
-
Jun.
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
20
-
-
79960996804
-
The secrecy capacity of the MIMO wiretap channel
-
Aug.
-
F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4961-4972, Aug. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.8
, pp. 4961-4972
-
-
Oggier, F.1
Hassibi, B.2
-
21
-
-
0003498504
-
-
7th ed. San Diego, CA, USA: Academic
-
I. S. Gradshteyn and I.M. Ryzhik, Table of Integrals, Series and Products, 7th ed. San Diego, CA, USA: Academic, 2007.
-
(2007)
Table of Integrals, Series and Products
-
-
Gradshteyn, I.S.1
Ryzhik, I.M.2
|