-
1
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Techn. J., vol. 54, no. 8, pp. 1355-1387, 1975.
-
(1975)
Bell Syst. Techn. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
2
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct.
-
P. K. Gopala, L. Lai, and H. E. Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
Gamal, H.E.3
-
3
-
-
68349116049
-
Information theoretic security
-
Y. Liang, H. Poor, S. Shamai, "Information theoretic security," Found. Trends Commun. Inf. Theory, vol. 5, no. 4-5, pp. 355-580, 2009.
-
(2009)
Found. Trends Commun. Inf. Theory
, vol.5
, Issue.4-5
, pp. 355-580
-
-
Liang, Y.1
Poor, H.2
Shamai, S.3
-
4
-
-
45249104850
-
Wireless information-theoretic security
-
Jun.
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.4
-
5
-
-
39049144353
-
Secrecy capacity of wireless channels
-
Jul.
-
J. Barros and M. R. D. Rodrigues, "Secrecy capacity of wireless channels," in Proc. IEEE ISIT, Jul. 2006, pp. 356-360.
-
(2006)
Proc. IEEE ISIT
, pp. 356-360
-
-
Barros, J.1
Rodrigues, M.R.D.2
-
6
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszar, I.1
Korner, J.2
-
7
-
-
0034588211
-
Energy-efficient antenna sharing and relaying for wireless networks
-
J. Laneman and G. Wornell, "Energy-efficient antenna sharing and relaying for wireless networks," in Proc. IEEE WCNC, 2000, vol. 1, pp. 7-12.
-
(2000)
Proc. IEEE WCNC
, vol.1
, pp. 7-12
-
-
Laneman, J.1
Wornell, G.2
-
8
-
-
5044252003
-
Cooperative diversity in wireless networks: Efficient protocols and outage behavior
-
Dec.
-
J. N. Laneman, D. N. C. Tse, and G.W.Wornell, "Cooperative diversity in wireless networks: Efficient protocols and outage behavior," IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3062-3080, Dec. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.12
, pp. 3062-3080
-
-
Laneman, J.N.1
Tse, D.N.C.2
Wornell, G.W.3
-
9
-
-
31744447581
-
Outage analysis of coded cooperation
-
Feb.
-
T. E. Hunter, S. Sanayei, and A. Nosratinia, "Outage analysis of coded cooperation," IEEE Trans. Inf. Theory, vol. 52, no. 2, pp. 375-391, Feb. 2006.
-
(2006)
IEEE Trans. Inf. Theory
, vol.52
, Issue.2
, pp. 375-391
-
-
Hunter, T.E.1
Sanayei, S.2
Nosratinia, A.3
-
10
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
Sep.
-
L.Lai and H. E. Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.9
, pp. 4005-4019
-
-
Lai, L.1
Gamal, H.E.2
-
11
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar.
-
L. Dong, Z. Han, A. Petropulu, and H. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.3
Poor, H.4
-
12
-
-
80052870842
-
On cooperative relaying schemes for wireless physical layer security
-
Oct.
-
J. Li, A. Petropulu, and S. Weber, "On cooperative relaying schemes for wireless physical layer security," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4985-4997, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 4985-4997
-
-
Li, J.1
Petropulu, A.2
Weber, S.3
-
13
-
-
84929964755
-
Multihop decode-and-forward relay networks: Secrecy analysis and relay position optimization
-
V. N. Q. Bao and N. L. Trung, "Multihop decode-and-forward relay networks: Secrecy analysis and relay position optimization," REV J. Electron. Commun., vol. 2, no. 1/2, pp. 33-41, 2012.
-
(2012)
REV J. Electron. Commun.
, vol.2
, Issue.1-2
, pp. 33-41
-
-
Bao, V.N.Q.1
Trung, N.L.2
-
14
-
-
33644986718
-
A simple cooperative diversity method based on network path selection
-
Mar.
-
A. Bletsas, A. Khisti, D. P. Reed, and A. Lippman, "A simple cooperative diversity method based on network path selection," IEEE J. Sel. Areas Commun., vol. 24, no. 3, pp. 659-672, Mar. 2006.
-
(2006)
IEEE J. Sel. Areas Commun.
, vol.24
, Issue.3
, pp. 659-672
-
-
Bletsas, A.1
Khisti, A.2
Reed, D.P.3
Lippman, A.4
-
15
-
-
76649093617
-
Performance analysis of adaptive decode-andforward cooperative diversity networks with best-relay selection
-
Jan.
-
S. Ikki and M. Ahmed, "Performance analysis of adaptive decode-andforward cooperative diversity networks with best-relay selection," IEEE Trans. Commun., vol. 58, no. 1, pp. 68-72, Jan. 2010.
-
(2010)
IEEE Trans. Commun.
, vol.58
, Issue.1
, pp. 68-72
-
-
Ikki, S.1
Ahmed, M.2
-
16
-
-
67651171477
-
Max-min relay selection for legacy amplify-and-forward systems with interference
-
Jun.
-
I. Krikidis, J. Thompson, S. McLaughlin, and N. Goertz, "Max-min relay selection for legacy amplify-and-forward systems with interference," IEEE Trans. Wireless Commun., vol. 8, no. 6, pp. 3016-3027, Jun. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.6
, pp. 3016-3027
-
-
Krikidis, I.1
Thompson, J.2
McLaughlin, S.3
Goertz, N.4
-
17
-
-
77955682277
-
An adaptive cooperation diversity scheme with best-relay selection in cognitive radio networks
-
Oct.
-
Y. Zou, J. Zhu, B. Zheng, and Y.-D. Yao, "An adaptive cooperation diversity scheme with best-relay selection in cognitive radio networks," IEEE Trans. Signal Process., vol. 58, no. 10, pp. 5438-5445, Oct. 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.10
, pp. 5438-5445
-
-
Zou, Y.1
Zhu, J.2
Zheng, B.3
Yao, Y.-D.4
-
18
-
-
84857225168
-
Relay selection in relay-assisted free space optical systems
-
Dec.
-
N. Chatzidiamantis, D. Michalopoulos, E. Kriezis, G. Karagiannidis, and R. Schober, "Relay selection in relay-assisted free space optical systems," in Proc. IEEE GLOBECOM, Dec. 2011, pp. 1-6.
-
(2011)
Proc. IEEE GLOBECOM
, pp. 1-6
-
-
Chatzidiamantis, N.1
Michalopoulos, D.2
Kriezis, E.3
Karagiannidis, G.4
Schober, R.5
-
19
-
-
53149112079
-
Amplify-andforward with partial relay selection
-
Apr.
-
I. Krikidis, J. Thompson, S. McLaughlin, and N. Goertz, "Amplify-andforward with partial relay selection," IEEE Commun. Lett., vol. 12, no. 4, pp. 235-237, Apr. 2008.
-
(2008)
IEEE Commun. Lett.
, vol.12
, Issue.4
, pp. 235-237
-
-
Krikidis, I.1
Thompson, J.2
McLaughlin, S.3
Goertz, N.4
-
20
-
-
79952175133
-
Capacity analysis of decode-and-forward protocol with partial relay selection
-
Oct.
-
X. Rui, "Capacity analysis of decode-and-forward protocol with partial relay selection," in Proc. WCSP, Oct. 2010, pp. 1-3.
-
(2010)
Proc. WCSP
, pp. 1-3
-
-
Rui, X.1
-
21
-
-
38349114163
-
Selection cooperation in multi-source cooperative networks
-
Jan.
-
E. Beres and R. Adve, "Selection cooperation in multi-source cooperative networks," IEEE Trans. Wireless Commun., vol. 7, no. 1, pp. 118-127, Jan. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.1
, pp. 118-127
-
-
Beres, E.1
Adve, R.2
-
22
-
-
77957340850
-
Opportunistic relay selection for cooperative networks with secrecy constraints
-
Oct.
-
I. Krikidis, "Opportunistic relay selection for cooperative networks with secrecy constraints," IETCommun., vol. 4, no. 15, pp. 1787-1791,Oct. 2010.
-
(2010)
IETCommun.
, vol.4
, Issue.15
, pp. 1787-1791
-
-
Krikidis, I.1
-
23
-
-
70350583050
-
Relay selection for secure cooperative networks with jamming
-
Oct.
-
I. Krikidis, J. Thompson, and S. McLaughlin, "Relay selection for secure cooperative networks with jamming," IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5003-5011, Oct. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.10
, pp. 5003-5011
-
-
Krikidis, I.1
Thompson, J.2
McLaughlin, S.3
-
24
-
-
84921773816
-
Secure relay and jammer selection for physical layer security
-
Aug.
-
H. Hui, A. Swindlehurst, G. Li, and J. Liang, "Secure relay and jammer selection for physical layer security," IEEE Signal Process. Lett., vol. 22, no. 8, pp. 1147-1151, Aug. 2015.
-
(2015)
IEEE Signal Process. Lett.
, vol.22
, Issue.8
, pp. 1147-1151
-
-
Hui, H.1
Swindlehurst, A.2
Li, G.3
Liang, J.4
-
25
-
-
84884537599
-
Optimal relay selection for physical-layer security in cooperative wireless networks
-
Oct.
-
Y. Zou, X.Wang, andW. Shen, "Optimal relay selection for physical-layer security in cooperative wireless networks," IEEE J. Sel. Areas Commun., vol. 31, no. 10, pp. 2099-2111, Oct. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.10
, pp. 2099-2111
-
-
Zou, Y.1
Wang, X.2
Shen, W.3
-
26
-
-
84919444513
-
Relay selection for multi-destination in cooperative networks with secrecy constraints
-
Sep.
-
E. R. Alotaibi and K. A. Hamdi, "Relay selection for multi-destination in cooperative networks with secrecy constraints," in Proc. IEEE 80th VTC Fall, Sep. 2014, pp. 1-5.
-
(2014)
Proc. IEEE 80th VTC Fall
, pp. 1-5
-
-
Alotaibi, E.R.1
Hamdi, K.A.2
-
27
-
-
84891556729
-
Relay selection schemes for dual-hop networks under security constraints with multiple eavesdroppers
-
Dec.
-
V. N. Q. Bao, N. Linh-Trung, and M. Debbah, "Relay selection schemes for dual-hop networks under security constraints with multiple eavesdroppers," IEEE Trans. Wireless Commun., vol. 12, no. 12, pp. 6076-6085, Dec. 2013.
-
(2013)
IEEE Trans. Wireless Commun.
, vol.12
, Issue.12
, pp. 6076-6085
-
-
Bao, V.N.Q.1
Linh-Trung, N.2
Debbah, M.3
-
28
-
-
84919796320
-
Security enhancement of cooperative single carrier systems
-
Jan.
-
L. Wang, K. J. Kim, T. Q. Duong, M. Elkashlan, and H. Poor, "Security enhancement of cooperative single carrier systems," IEEE Trans. Inf. Forensics Security, vol. 10, no. 1, pp. 90-103, Jan. 2015.
-
(2015)
IEEE Trans. Inf. Forensics Security
, vol.10
, Issue.1
, pp. 90-103
-
-
Wang, L.1
Kim, K.J.2
Duong, T.Q.3
Elkashlan, M.4
Poor, H.5
-
29
-
-
84907525208
-
Secure multiuser communications in multiple amplify-and-forward relay networks
-
Sep.
-
L. Fan, X. Lei, T. Q. Duong, M. Elkashlan, and G. Karagiannidis, "Secure multiuser communications in multiple amplify-and-forward relay networks," IEEE Trans. Commun., vol. 62, no. 9, pp. 3299-3310, Sep. 2014.
-
(2014)
IEEE Trans. Commun.
, vol.62
, Issue.9
, pp. 3299-3310
-
-
Fan, L.1
Lei, X.2
Duong, T.Q.3
Elkashlan, M.4
Karagiannidis, G.5
-
30
-
-
84936861070
-
Secrecy outage of dual-hop amplifyand-forward system and its application to relay selection
-
May
-
A. Jindal, C. Kundu, and R. Bose, "Secrecy outage of dual-hop amplifyand-forward system and its application to relay selection," in Proc. IEEE 79th VTC Spring, May 2014, pp. 1-5.
-
(2014)
Proc. IEEE 79th VTC Spring
, pp. 1-5
-
-
Jindal, A.1
Kundu, C.2
Bose, R.3
-
31
-
-
84907993807
-
Secrecy outage of dual-hop AF relay system with relay selection without Eavesdropper's CSI
-
Oct.
-
A. Jindal, C. Kundu, and R. Bose, "Secrecy outage of dual-hop AF relay system with relay selection without Eavesdropper's CSI," IEEE Commun. Lett., vol. 18, no. 10, pp. 1759-1762, Oct. 2014.
-
(2014)
IEEE Commun. Lett.
, vol.18
, Issue.10
, pp. 1759-1762
-
-
Jindal, A.1
Kundu, C.2
Bose, R.3
-
32
-
-
84919667792
-
Secrecy outage and diversity analysis of cognitive radio systems
-
Nov.
-
Y. Zou, X. Li, and Y. Liang, "Secrecy outage and diversity analysis of cognitive radio systems," IEEE J. Sel. Areas Commun., vol. 32, no. 11, pp. 2222-2236, Nov. 2014.
-
(2014)
IEEE J. Sel. Areas Commun.
, vol.32
, Issue.11
, pp. 2222-2236
-
-
Zou, Y.1
Li, X.2
Liang, Y.3
-
33
-
-
84939559254
-
Opportunistic relay selection for secrecy enhancement in cooperative networks
-
in press
-
F. S. AL-Qahtani, C. Zhong, and H. Alnuweiri, "Opportunistic relay selection for secrecy enhancement in cooperative networks," IEEE Trans. Commun., in press.
-
IEEE Trans. Commun.
-
-
AL-Qahtani, F.S.1
Zhong, C.2
Alnuweiri, H.3
-
34
-
-
34047113337
-
Outage analysis for co-operative communication with multiple amplify-and-forward relays
-
Mar.
-
A. Bletsas, H. Shin, and M. Z. Win, "Outage analysis for co-operative communication with multiple amplify-and-forward relays," Electron. Lett., vol. 43, no. 6, pp. 51-52, Mar. 2007.
-
(2007)
Electron. Lett.
, vol.43
, Issue.6
, pp. 51-52
-
-
Bletsas, A.1
Shin, H.2
Win, M.Z.3
-
35
-
-
84880688602
-
Outage probability analysis of an amplify-and-forward cooperative communication system with multi-path channels and max-min relay selection
-
Mar.
-
M. M. Eddaghel, U. N. Mannai, G. J. Chen, and J. A. Chambers, "Outage probability analysis of an amplify-and-forward cooperative communication system with multi-path channels and max-min relay selection," IET Commun., vol. 7, no. 5, pp. 408-416, Mar. 2013.
-
(2013)
IET Commun.
, vol.7
, Issue.5
, pp. 408-416
-
-
Eddaghel, M.M.1
Mannai, U.N.2
Chen, G.J.3
Chambers, J.A.4
-
36
-
-
64549128283
-
Secure wireless communications via cooperation
-
Sep.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Secure wireless communications via cooperation," in Proc. 46th Annu. Allerton Conf. Commun., Control, Comput., Sep. 2008, pp. 1132-1138.
-
(2008)
Proc. 46th Annu. Allerton Conf. Commun., Control, Comput.
, pp. 1132-1138
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
37
-
-
70349269579
-
Secrecy capacity of a class of orthogonal relay eavesdropper channels
-
Feb.
-
V. Aggarwal, L. Sankar, A. R. Calderbank, and H. V. Poor, "Secrecy capacity of a class of orthogonal relay eavesdropper channels," in Proc. Inf. Theory Appl. Workshop, Feb. 2009, pp. 295-300.
-
(2009)
Proc. Inf. Theory Appl. Workshop
, pp. 295-300
-
-
Aggarwal, V.1
Sankar, L.2
Calderbank, A.R.3
Poor, H.V.4
-
38
-
-
35148893949
-
Hierarchical cooperation achieves optimal capacity scaling in ad hoc networks
-
Oct.
-
A. Ozgur, O. Leveque, and D. N. C. Tse, "Hierarchical cooperation achieves optimal capacity scaling in ad hoc networks," IEEE Trans. Inf. Theory, vol. 53, no. 10, pp. 3549-3572, Oct. 2007.
-
(2007)
IEEE Trans. Inf. Theory
, vol.53
, Issue.10
, pp. 3549-3572
-
-
Ozgur, A.1
Leveque, O.2
Tse, D.N.C.3
-
39
-
-
0004082156
-
-
4th ed. New York NY USA McGraw-Hill
-
J. Proakis, Digital Communications, 4th ed. New York, NY, USA: McGraw-Hill, 2001.
-
(2001)
Digital Communications
-
-
Proakis, J.1
-
40
-
-
69949115853
-
Adaptive relay selection in cooperative wireless networks
-
Sep.
-
H. Adam, C. Bettstetter, and S. M. Senouci, "Adaptive relay selection in cooperative wireless networks," in Proc. IEEE 19th PIMRC, Sep. 2008, pp. 1-5.
-
(2008)
Proc. IEEE 19th PIMRC
, pp. 1-5
-
-
Adam, H.1
Bettstetter, C.2
Senouci, S.M.3
-
41
-
-
79957667257
-
Interference alignment for secrecy
-
Jun.
-
O. O. Koyluoglu, H. El-Gamal, L. Lifeng, and H. V. Poor, "Interference alignment for secrecy," IEEE Trans. Inf. Theory, vol. 57, no. 6, pp. 3323-3332, Jun. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.6
, pp. 3323-3332
-
-
Koyluoglu, O.O.1
El-Gamal, H.2
Lifeng, L.3
Poor, H.V.4
-
42
-
-
0003663467
-
-
4th ed New York, NY, USA: McGraw-Hill
-
A. Papoulis and S. U. Pillai, Probability, Random Variables and Stochastic Processes, 4th ed. New York, NY, USA: McGraw-Hill, 2002.
-
(2002)
Probability Random Variables and Stochastic Processes
-
-
Papoulis, A.1
Pillai, S.U.2
-
43
-
-
77955397565
-
A decentralized power allocation scheme for amplify-and-forward multi-hop relaying systems
-
May
-
G. Farhadi and N. C. Beaulieu, "A decentralized power allocation scheme for amplify-and-forward multi-hop relaying systems," in Proc. IEEE ICC, May 2010, pp. 1-6.
-
(2010)
Proc. IEEE ICC
, pp. 1-6
-
-
Farhadi, G.1
Beaulieu, N.C.2
|