-
1
-
-
68349116049
-
Information theoretical security
-
Y. Liang, H. V. Poor, and S. Shamai, "Information theoretical security," Found. Trends Commun. Inf. Theory, Vol. 5, no. 4-5, pp. 355-580, 2008.
-
(2008)
Found. Trends Commun. Inf. Theory
, vol.5
, Issue.4-5
, pp. 355-580
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
2
-
-
0016562514
-
The wire-tap channel
-
Jan.
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., Vol. 54, no. 8, pp. 1355-1387, Jan. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
3
-
-
84906698210
-
Principles of physical layer security in multiuser wireless networks: A survey
-
Third Quarter
-
A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst, "Principles of physical layer security in multiuser wireless networks: A survey," IEEE Commun. Surveys Tuts., Vol. 16, no. 3, pp. 1550-1573, Third Quarter 2014.
-
(2014)
IEEE Commun. Surveys Tuts.
, vol.16
, Issue.3
, pp. 1550-1573
-
-
Mukherjee, A.1
Fakoorian, S.A.A.2
Huang, J.3
Swindlehurst, A.L.4
-
4
-
-
84919696544
-
CAO-SIR: Channel aware ordered successive relaying
-
Dec.
-
W. Chen, "CAO-SIR: Channel aware ordered successive relaying," IEEE Trans. Wireless Commun., Vol. 13, no. 12, pp. 6513-6527, Dec. 2014.
-
(2014)
IEEE Trans. Wireless Commun.
, vol.13
, Issue.12
, pp. 6513-6527
-
-
Chen, W.1
-
5
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., Vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
6
-
-
80052870842
-
On cooperative relaying schemes for wireless physical layer security
-
Oct.
-
J. Li, A. P. Petropulu, and S. Weber, "On cooperative relaying schemes for wireless physical layer security," IEEE Trans. Signal Process., Vol. 59, no. 10, pp. 4985-4997, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 4985-4997
-
-
Li, J.1
Petropulu, A.P.2
Weber, S.3
-
7
-
-
84870554789
-
Cooperative secure beamforming for AF relay networks with multiple eavesdroppers
-
Jan.
-
Y. Yang, Q. Li, W.-K. Ma, J. Ge, and P. C. Ching, "Cooperative secure beamforming for AF relay networks with multiple eavesdroppers," IEEE Signal Process. Lett., Vol. 20, no. 1, pp. 35-38, Jan. 2013.
-
(2013)
IEEE Signal Process. Lett.
, vol.20
, Issue.1
, pp. 35-38
-
-
Yang, Y.1
Li, Q.2
Ma, W.-K.3
Ge, J.4
Ching, P.C.5
-
8
-
-
84906993304
-
Transmit power minimization beamforming via amplify-and-forward relays in wireless networks with multiple eavesdroppers
-
Sydney, Australia, Jun
-
Z. Liu, C. Chen, L. Bai, H. Xiang, and J. Choi, "Transmit power minimization beamforming via amplify-and-forward relays in wireless networks with multiple eavesdroppers," in Proc. 2014 IEEE Int. Conf. Commun. (ICC), Sydney, Australia, Jun. 2014, pp. 4698-4703.
-
(2014)
Proc. 2014 IEEE Int. Conf. Commun. (ICC)
, pp. 4698-4703
-
-
Liu, Z.1
Chen, C.2
Bai, L.3
Xiang, H.4
Choi, J.5
-
9
-
-
84906991688
-
Joint GSVD-SVD precoding and power allocation for security of AF MIMO relay networks
-
Sydney, Australia, Jun
-
H.-M. Wang, F. Liu, and P. Mu, "Joint GSVD-SVD precoding and power allocation for security of AF MIMO relay networks," in Proc. 2014 IEEE Int. Conf. Commun. (ICC), Sydney, Australia, Jun. 2014, pp. 5083-5088.
-
(2014)
Proc. 2014 IEEE Int. Conf. Commun. (ICC)
, pp. 5083-5088
-
-
Wang, H.-M.1
Liu, F.2
Mu, P.3
-
10
-
-
84876796391
-
Destination assisted cooperative jamming for wireless physical-layer security
-
Apr.
-
Y. Liu, J. Li, and A. P. Petropulu, "Destination assisted cooperative jamming for wireless physical-layer security," IEEE Trans. Inf. Forensics Security, Vol. 8, no. 4, pp. 682-694, Apr. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.4
, pp. 682-694
-
-
Liu, Y.1
Li, J.2
Petropulu, A.P.3
-
11
-
-
80052889357
-
Cooperative jamming for secure communications in MIMO relay networks
-
Oct.
-
J. Huang and A. L. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Trans. Signal Process., Vol. 59, no. 10, pp. 4871-4884, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 4871-4884
-
-
Huang, J.1
Swindlehurst, A.L.2
-
12
-
-
84904614329
-
Security versus reliability analysis of opportunistic relaying
-
Jul.
-
Y. Zou, X. Wang, W. Shen, and L. Hanzo, "Security versus reliability analysis of opportunistic relaying," IEEE Trans. Veh. Technol., Vol. 63, no. 6, pp. 2653-2661, Jul. 2014.
-
(2014)
IEEE Trans. Veh. Technol.
, vol.63
, Issue.6
, pp. 2653-2661
-
-
Zou, Y.1
Wang, X.2
Shen, W.3
Hanzo, L.4
-
13
-
-
84940644968
-
A mathematical theory of communications
-
C. E. Shannon, "A mathematical theory of communications," Bell Syst. Tech. J., Vol. 27, pp. 379-423, 1948.
-
(1948)
Bell Syst. Tech. J.
, vol.27
, pp. 379-423
-
-
Shannon, C.E.1
-
14
-
-
0347337828
-
Secure space-time communication
-
Dec.
-
A. O. Hero, "Secure space-time communication," IEEE Trans. Inf. Theory, Vol. 49, no. 12, pp. 3235-3249, Dec. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.12
, pp. 3235-3249
-
-
Hero, A.O.1
-
16
-
-
0033743071
-
Robust control via concave minimization local and global algorithms
-
Feb.
-
P. Apkarian and H. D. Tuan, "Robust control via concave minimization local and global algorithms," IEEE Trans. Autom. Control, Vol. 45, no. 2, pp. 299-305, Feb. 2000.
-
(2000)
IEEE Trans. Autom. Control
, vol.45
, Issue.2
, pp. 299-305
-
-
Apkarian, P.1
Tuan, H.D.2
|