메뉴 건너뛰기




Volumn 2015-September, Issue , 2015, Pages 4468-4473

Secure green communication for amplify-and-forward relaying with eavesdroppers

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84953721841     PISSN: 15503607     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICC.2015.7249026     Document Type: Conference Paper
Times cited : (7)

References (12)
  • 1
    • 84919696544 scopus 로고    scopus 로고
    • CAO-SIR: Channel aware ordered successive relaying
    • Dec.
    • W. Chen, "CAO-SIR: channel aware ordered successive relaying," IEEE Trans. Wireless Commun., Vol. 13, no. 12, pp. 6513-6527, Dec. 2014.
    • (2014) IEEE Trans. Wireless Commun. , vol.13 , Issue.12 , pp. 6513-6527
    • Chen, W.1
  • 2
    • 84863075769 scopus 로고    scopus 로고
    • A unified matching framework for multi-flow decode-and-forward cooperative networks
    • Feb.
    • B. Bai, W. Chen, K. B. Letaief, and Z. Cao, "A unified matching framework for multi-flow decode-and-forward cooperative networks," IEEE J. Sel. Areas Commun., Vol. 30, no. 2, pp. 397-406, Feb. 2012.
    • (2012) IEEE J. Sel. Areas Commun. , vol.30 , Issue.2 , pp. 397-406
    • Bai, B.1    Chen, W.2    Letaief, K.B.3    Cao, Z.4
  • 3
    • 79551623225 scopus 로고    scopus 로고
    • Improving wireless physical layer security via cooperating relays
    • Mar.
    • L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., Vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
    • (2010) IEEE Trans. Signal Process. , vol.58 , Issue.3 , pp. 1875-1888
    • Dong, L.1    Han, Z.2    Petropulu, A.P.3    Poor, H.V.4
  • 4
    • 80051775150 scopus 로고    scopus 로고
    • Power and subcarrier allocation for physical-layer security in OFDMA-based broadband wireless networks
    • Sep.
    • X. Wang, M. Tao, J. Mo, and Y. Xu, "Power and subcarrier allocation for physical-layer security in OFDMA-based broadband wireless networks," IEEE Trans. Inf. Forensics Security, Vol. 6, no. 3, pp. 693-702, Sep. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.3 , pp. 693-702
    • Wang, X.1    Tao, M.2    Mo, J.3    Xu, Y.4
  • 6
    • 84863941590 scopus 로고    scopus 로고
    • Energy-efficient resource allocation for secure OFDMA systems
    • Jul.
    • D. W. K. Ng, E. S. Lo, and R. Schober, "Energy-efficient resource allocation for secure OFDMA systems," IEEE Trans. Veh. Technol., Vol. 61, no. 6, pp. 2572-2585, Jul. 2012.
    • (2012) IEEE Trans. Veh. Technol. , vol.61 , Issue.6 , pp. 2572-2585
    • Ng, D.W.K.1    Lo, E.S.2    Schober, R.3
  • 7
    • 84890487918 scopus 로고    scopus 로고
    • An information theoretic framework for energy efficient secrecy
    • Vancouver, May
    • C. Comaniciu, H. V. Poor, and R. Zhang, "An information theoretic framework for energy efficient secrecy," in Proc. IEEE ICASSP, Vancouver, May. 2013.
    • (2013) Proc. IEEE ICASSP
    • Comaniciu, C.1    Poor, H.V.2    Zhang, R.3
  • 8
    • 0016943716 scopus 로고
    • Fractional programming. II, on dinkelbach's algorithm
    • Apr.
    • S. Schaible, "Fractional programming. II, on Dinkelbach's algorithm," Managment Science, Vol. 22, no. 8, pp. 868-873, Apr. 1976.
    • (1976) Managment Science , vol.22 , Issue.8 , pp. 868-873
    • Schaible, S.1
  • 9
    • 33747308413 scopus 로고    scopus 로고
    • A tutorial on decomposition methods for network utility maximization
    • Aug.
    • D. P. Palomar and M. Chiang, "A tutorial on decomposition methods for network utility maximization," IEEE J. Sel. Areas Commun., Vol. 24, no. 8, pp. 1439-1451, Aug. 2006.
    • (2006) IEEE J. Sel. Areas Commun. , vol.24 , Issue.8 , pp. 1439-1451
    • Palomar, D.P.1    Chiang, M.2
  • 10
    • 15244346000 scopus 로고    scopus 로고
    • The DC (difference of convex functions) programming and DCA revisited with DC models of real world nonconvex optimization problems
    • H. A. L. Thi and T. P. Dinh, "The DC (difference of convex functions) programming and DCA revisited with DC models of real world nonconvex optimization problems," Annals of Operations Research, pp. 23-46, 2005.
    • (2005) Annals of Operations Research , pp. 23-46
    • Thi, H.A.L.1    Dinh, T.P.2
  • 11
    • 84856271363 scopus 로고    scopus 로고
    • On the application of cooperative transmission to secrecy communications
    • Feb.
    • Z. Ding, K. K. Leung, D. L. Goeckel, and D. Towsley, "On the application of cooperative transmission to secrecy communications," IEEE J. Sel. Areas Commun., Vol. 30, no. 2, pp. 359-368, Feb. 2012.
    • (2012) IEEE J. Sel. Areas Commun. , vol.30 , Issue.2 , pp. 359-368
    • Ding, Z.1    Leung, K.K.2    Goeckel, D.L.3    Towsley, D.4
  • 12
    • 84860218675 scopus 로고    scopus 로고
    • Beamforming optimization in multi-user amplify-and-forward wireless relay networks
    • Apr.
    • A. H. Phan, H. D. Tuan, H. H. Kha, and H. H. Nguyen, "Beamforming optimization in multi-user amplify-and-forward wireless relay networks," IEEE Trans. Wireless Commun., Vol. 11, no. 4, pp. 1510-1520, Apr. 2012.
    • (2012) IEEE Trans. Wireless Commun. , vol.11 , Issue.4 , pp. 1510-1520
    • Phan, A.H.1    Tuan, H.D.2    Kha, H.H.3    Nguyen, H.H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.