-
1
-
-
79955372872
-
Physical layer security in wireless networks: A tutorial
-
Apr
-
Y.-S. Shiu, S. Y. Chang, H.-C. Wu, S. C.-H. Huang, and H.-H. Chen, "Physical layer security in wireless networks: A tutorial," IEEE Commun. Mag., vol. 18, no. 5, pp. 66-74, Apr. 2011.
-
(2011)
IEEE Commun. Mag.
, vol.18
, Issue.5
, pp. 66-74
-
-
Shiu, Y.-S.1
Chang, S.Y.2
Wu, H.-C.3
Huang, S.C.-H.4
Chen, H.-H.5
-
2
-
-
79960399745
-
Robust beamforming for secrecy in MIMO wiretap channels with imperfect CSI
-
Jan
-
A. Mukherjee and A. L. Swindlehurst, "Robust beamforming for secrecy in MIMO wiretap channels with imperfect CSI," IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351-361, Jan. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.1
, pp. 351-361
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
3
-
-
84857366311
-
Physical layer security in multibeam satellite systems
-
Dec
-
G. Zheng, P. Arapoglou, and B. Ottersten, "Physical layer security in multibeam satellite systems," IEEE Trans. Wireless Commun., vol. 11, no. 2, pp. 852-863, Dec. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.11
, Issue.2
, pp. 852-863
-
-
Zheng, G.1
Arapoglou, P.2
Ottersten, B.3
-
4
-
-
84880159277
-
Physical layer security in cellular networks: A stochastic geometry approach
-
May
-
H. Wang, X. Zhou, and M. Reed, "Physical layer security in cellular networks: A stochastic geometry approach," IEEE Trans. Wireless Commun., vol. 12, no. 6, pp. 2776-2787, May 2013.
-
(2013)
IEEE Trans. Wireless Commun.
, vol.12
, Issue.6
, pp. 2776-2787
-
-
Wang, H.1
Zhou, X.2
Reed, M.3
-
5
-
-
84903148893
-
Physical layer security in downlink multi-antenna cellular networks
-
Jun
-
G. Geraci, H. S. Dhillon, J. G. Andrews, J. Yuan, and I. B. Collings, "Physical layer security in downlink multi-antenna cellular networks," IEEE Trans. Commun., vol. 62, no. 6, pp. 2006-2021, Jun. 2014.
-
(2014)
IEEE Trans. Commun.
, vol.62
, Issue.6
, pp. 2006-2021
-
-
Geraci, G.1
Dhillon, H.S.2
Andrews, J.G.3
Yuan, J.4
Collings, I.B.5
-
6
-
-
84890522850
-
Communication theory of secrecy systems
-
Oct
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Techn. J., vol. 28, no. 4, pp. 656-715, Oct. 1949.
-
(1949)
Bell Syst. Techn. J.
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
-
7
-
-
0016562514
-
The wire-tap channel
-
Oct
-
A. Wyner, "The wire-tap channel," Bell Syst. Techn. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Techn. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.1
-
8
-
-
0017996501
-
The Gaussian wire-tap channel
-
Jul
-
S. K. Leung-Yan-Cheong and M. E. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, Jul. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.K.1
Hellman, M.E.2
-
9
-
-
84907000406
-
On the target secrecy rate for SISOME wiretap channels
-
Jun
-
S. Yan, G. Geraci, N. Yang, R. Malaney, and J. Yuan, "On the target secrecy rate for SISOME wiretap channels," in Proc. IEEE ICC, Jun. 2014, pp. 987-992.
-
(2014)
Proc. IEEE ICC
, pp. 987-992
-
-
Yan, S.1
Geraci, G.2
Yang, N.3
Malaney, R.4
Yuan, J.5
-
10
-
-
34547922334
-
Applications of LDPC codes to the wiretap channel
-
Aug
-
A. Thangaraj, S. Dihidar, A. R. Calderbank, S. W. McLaughlin, and J.-M. Merolla, "Applications of LDPC codes to the wiretap channel," IEEE Trans. Inf. Theory, vol. 53, no. 8, pp. 2933-2945, Aug. 2007.
-
(2007)
IEEE Trans. Inf. Theory
, vol.53
, Issue.8
, pp. 2933-2945
-
-
Thangaraj, A.1
Dihidar, S.2
Calderbank, A.R.3
McLaughlin, S.W.4
Merolla, J.-M.5
-
11
-
-
80051720839
-
LDPC codes for the Gaussian wiretap channel
-
Sep
-
D. Klinc, J. Ha, S. W. McLaughlin, J. Barros, and B.-J. Kwak, "LDPC codes for the Gaussian wiretap channel," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 532-540, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 532-540
-
-
Klinc, D.1
Ha, J.2
McLaughlin, S.W.3
Barros, J.4
Kwak, B.-J.5
-
12
-
-
85032751057
-
Coding for secrecy: An overview of error-control coding techniques for physical-layer security
-
Sep
-
W. K. Harrison, J. Almeida, M. R. Bloch, S. W. McLaughlin, and J. Barros, "Coding for secrecy: An overview of error-control coding techniques for physical-layer security," IEEE Signal Process. Mag., vol. 30, no. 5, pp. 41-50, Sep. 2013.
-
(2013)
IEEE Signal Process. Mag.
, vol.30
, Issue.5
, pp. 41-50
-
-
Harrison, W.K.1
Almeida, J.2
Bloch, M.R.3
McLaughlin, S.W.4
Barros, J.5
-
13
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct
-
P. K. Gopala, L. Lai, and H. E. Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
Gamal, H.E.3
-
14
-
-
69449086815
-
Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel
-
Sep
-
S. Shafiee, N. Liu, and S. Ulukus, "Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel," IEEE Trans. Inf. Theory, vol. 55, no. 9, pp. 4033-4039, Sep. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.9
, pp. 4033-4039
-
-
Shafiee, S.1
Liu, N.2
Ulukus, S.3
-
15
-
-
77958560746
-
Secure transmission with multiple antennas - Part II: The MIMOME wiretap channel
-
Nov
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas - Part II: The MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.11
, pp. 5515-5532
-
-
Khisti, A.1
Wornell, G.W.2
-
16
-
-
79960996804
-
The secrecy capacity of the MIMO wiretap channel
-
Aug
-
F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4961-4972, Aug. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.8
, pp. 4961-4972
-
-
Oggier, F.1
Hassibi, B.2
-
17
-
-
77953802876
-
Secure transmission with multiple antennas I: The MISOME wiretap channel
-
Jul
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas I: The MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, Jul. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.7
, pp. 3088-3104
-
-
Khisti, A.1
Wornell, G.W.2
-
18
-
-
33749450172
-
Secrecy capacity of SIMO and slow fading channels
-
Sep
-
P. Parada and R. Blahut, "Secrecy capacity of SIMO and slow fading channels," in Proc. IEEE ISIT, Sep. 2005, pp. 2152-2155.
-
(2005)
Proc. IEEE ISIT
, pp. 2152-2155
-
-
Parada, P.1
Blahut, R.2
-
19
-
-
45249104850
-
Wireless information-theoretic security
-
Jun
-
M. Bloch, J. Barros, M. Rodrigues, and S. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.3
McLaughlin, S.4
-
20
-
-
84860863805
-
Performance of transmit antenna selection physical layer security schemes
-
Jun
-
H. Alves, R. D. Souza, M. Debbah, and M. Bennis, "Performance of transmit antenna selection physical layer security schemes," IEEE Signal Process. Lett., vol. 19, no. 6, pp. 372-375, Jun. 2012.
-
(2012)
IEEE Signal Process. Lett.
, vol.19
, Issue.6
, pp. 372-375
-
-
Alves, H.1
Souza, R.D.2
Debbah, M.3
Bennis, M.4
-
21
-
-
84873731253
-
Transmit antenna selection for security enhancement in MIMO wiretap channels
-
Jan
-
N. Yang, P. L. Yeoh, M. Elkashlan, R. Schober, and I. B. Collings, "Transmit antenna selection for security enhancement in MIMO wiretap channels," IEEE Trans. Commun., vol. 61, no. 1, pp. 144-154, Jan. 2013.
-
(2013)
IEEE Trans. Commun.
, vol.61
, Issue.1
, pp. 144-154
-
-
Yang, N.1
Yeoh, P.L.2
Elkashlan, M.3
Schober, R.4
Collings, I.B.5
-
22
-
-
84897913176
-
Transmit antenna selection with Alamouti coding and power allocation in MIMO wiretap channels
-
Mar
-
S. Yan, N. Yang, R. Malaney, and J. Yuan, "Transmit antenna selection with Alamouti coding and power allocation in MIMO wiretap channels," IEEE Trans. Wireless Commun., vol. 13, no. 3, pp. 1656-1667, Mar. 2014.
-
(2014)
IEEE Trans. Wireless Commun.
, vol.13
, Issue.3
, pp. 1656-1667
-
-
Yan, S.1
Yang, N.2
Malaney, R.3
Yuan, J.4
-
23
-
-
0034201987
-
Performance analysis of maximal ratio combining and comparison with optimum combining for mobile radio communications with cochannel interference
-
Jul
-
A. Shah and A. M. Haimovich, "Performance analysis of maximal ratio combining and comparison with optimum combining for mobile radio communications with cochannel interference," IEEE Trans. Veh. Technol., vol. 49, no. 4, pp. 1454-1463, Jul. 2000.
-
(2000)
IEEE Trans. Veh. Technol.
, vol.49
, Issue.4
, pp. 1454-1463
-
-
Shah, A.1
Haimovich, A.M.2
-
24
-
-
24644476931
-
Analysis of transmit antenna selection/maximal-ratio combining in Rayleigh fading channels
-
Jul
-
Z. Chen, J. Yuan, and B. Vucetic, "Analysis of transmit antenna selection/maximal-ratio combining in Rayleigh fading channels," IEEE Trans. Veh. Technol., vol. 54, no. 4, pp. 1312-1321, Jul. 2005.
-
(2005)
IEEE Trans. Veh. Technol.
, vol.54
, Issue.4
, pp. 1312-1321
-
-
Chen, Z.1
Yuan, J.2
Vucetic, B.3
-
26
-
-
79956205910
-
Maximal ratio diversity combining enhanced security
-
May
-
F. He, H. Man, and W. Wang, "Maximal ratio diversity combining enhanced security," IEEE Comm. Lett., vol. 15, no. 5, pp. 509-511, May 2011.
-
(2011)
IEEE Comm. Lett.
, vol.15
, Issue.5
, pp. 509-511
-
-
He, F.1
Man, H.2
Wang, W.3
-
27
-
-
79952706123
-
Rethinking the secrecy outage formulation: A secure transmission design perspective
-
Mar
-
X. Zhou, M. R. McKay, B. Maham, and A. Hjørungnes, "Rethinking the secrecy outage formulation: A secure transmission design perspective," IEEE Commun. Lett., vol. 15, no. 3, pp. 302-304, Mar. 2011.
-
(2011)
IEEE Commun. Lett.
, vol.15
, Issue.3
, pp. 302-304
-
-
Zhou, X.1
McKay, M.R.2
Maham, B.3
Hjørungnes, A.4
-
28
-
-
80051755314
-
Keys through ARQ: Theory and practice
-
Sep
-
Y. Abdallah, M. A. Latif, M. Youssef, A. Sultan, and H. El Gamal, "Keys through ARQ: Theory and practice," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 737-751, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 737-751
-
-
Abdallah, Y.1
Latif, M.A.2
Youssef, M.3
Sultan, A.4
El Gamal, H.5
-
29
-
-
84879203277
-
On the design of artificial-noise-aided secure multi-antenna transmission in slow fading channels
-
Jun
-
X. Zhang, X. Zhou, and M. R. McKay, "On the design of artificial-noise-aided secure multi-antenna transmission in slow fading channels," IEEE Trans. Veh. Technol., vol. 62, no. 5, pp. 2170-2181, Jun. 2013.
-
(2013)
IEEE Trans. Veh. Technol.
, vol.62
, Issue.5
, pp. 2170-2181
-
-
Zhang, X.1
Zhou, X.2
McKay, M.R.3
-
30
-
-
0039361403
-
Orbits of the unit sphere of L(H, K) under symplectic transformations
-
N. J. Young, "Orbits of the unit sphere of L(H, K) under symplectic transformations," J. Operator Theory, vol. 11, pp. 171-191, 1984.
-
(1984)
J. Operator Theory
, vol.11
, pp. 171-191
-
-
Young, N.J.1
-
31
-
-
0003498504
-
-
7th ed. New York, NY, USA: Academic
-
I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series and Products, 7th ed. New York, NY, USA: Academic, 2007.
-
(2007)
Table of Integrals, Series and Products
-
-
Gradshteyn, I.S.1
Ryzhik, I.M.2
|