-
1
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
2
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
3
-
-
84880150823
-
Large system analysis of linear precoding in MISO broadcast channels with confidential messages
-
Sep.
-
G. Geraci, R. Couillet, J. Yuan, M. Debbah, I. B. Collings, "Large system analysis of linear precoding in MISO broadcast channels with confidential messages," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1660-1671, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
, pp. 1660-1671
-
-
Geraci, G.1
Couillet, R.2
Yuan, J.3
Debbah, M.4
Collings, I.B.5
-
4
-
-
84901335099
-
Secrecy rates in broadcast channels with confidential messages and external eavesdroppers
-
May
-
G. Geraci, S. Singh, J. G.,rews, J. Yuan, I. B. Collings, "Secrecy rates in broadcast channels with confidential messages and external eavesdroppers," IEEE Trans. Wireless Commun., vol. 13, no. 5, pp. 2931-2943, May 2014.
-
(2014)
IEEE Trans. Wireless Commun.
, vol.13
, Issue.5
, pp. 2931-2943
-
-
Geraci, G.1
Singh, S.2
Rews, J.G.3
Yuan, J.4
Collings, I.B.5
-
5
-
-
52349090496
-
The secrecy capacity of the MIMO wiretap channel
-
Toronto, ON, Canada Jul.
-
F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," in Proc. IEEE Int. Symp. Inf. Theory, Toronto, ON, Canada, Jul. 2008, pp. 524-528.
-
(2008)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 524-528
-
-
Oggier, F.1
Hassibi, B.2
-
6
-
-
77955721830
-
Multiple-input multiple-output Gaussian broadcast channels with confidential messages
-
Sep.
-
R. Liu, T. Liu, H. V. Poor, S. Shamai, "Multiple-input multiple-output Gaussian broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 56, no. 9, pp. 4215-4227, Sep. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.9
, pp. 4215-4227
-
-
Liu, R.1
Liu, T.2
Poor, H.V.3
Shamai, S.4
-
7
-
-
77958560746
-
Secure transmission with multiple antennas-Part II: The MIMOME wiretap channel
-
Nov.
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas-Part II: The MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.11
, pp. 5515-5532
-
-
Khisti, A.1
Wornell, G.W.2
-
8
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
Sep.
-
L. Lai and H. E. Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.9
, pp. 4005-4019
-
-
Lai, L.1
Gamal, H.E.2
-
9
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar.
-
L. Dong, Z. Han, A. P. Petropulu, H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
10
-
-
84870512709
-
Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's ICSI
-
Jan.
-
H.-M. Wang, M. Luo, X.-G. Xia, Q. Yin, "Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's ICSI," IEEE Signal Process. Lett., vol. 20, no. 1, pp. 39-42, Jan. 2013.
-
(2013)
IEEE Signal Process. Lett.
, vol.20
, Issue.1
, pp. 39-42
-
-
Wang, H.-M.1
Luo, M.2
Xia, X.-G.3
Yin, Q.4
-
11
-
-
84930197364
-
Outage constrained secrecy throughput maximization for DF relay networks
-
May
-
T.-X. Zheng, H.-M. Wang, F. Liu, M. H. Lee, "Outage constrained secrecy throughput maximization for DF relay networks," IEEE Trans. Commun., vol. 63, no. 5, pp. 1741-1755, May 2015.
-
(2015)
IEEE Trans. Commun.
, vol.63
, Issue.5
, pp. 1741-1755
-
-
Zheng, T.-X.1
Wang, H.-M.2
Liu, F.3
Lee, M.H.4
-
12
-
-
45249101530
-
The general Gaussian multiple access and twoway wire-tap channels: Achievable rates and cooperative jamming
-
Jun.
-
E. Tekin and A. Yener, "The general Gaussian multiple access and twoway wire-tap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
13
-
-
84862635573
-
Distributed beamforming for physical-layer security of two-way relay networks
-
Jul.
-
H.-M. Wang, Q. Yin, X.-G. Xia, "Distributed beamforming for physical-layer security of two-way relay networks," IEEE Trans. Signal Process., vol. 60, no. 7, pp. 3532-3545, Jul. 2012.
-
(2012)
IEEE Trans. Signal Process.
, vol.60
, Issue.7
, pp. 3532-3545
-
-
Wang, H.-M.1
Yin, Q.2
Xia, X.-G.3
-
14
-
-
84888318377
-
Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks
-
Dec.
-
H.-M. Wang, M. Luo, Q. Yin, "Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks," IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 2007-2020, Dec. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.12
, pp. 2007-2020
-
-
Wang, H.-M.1
Luo, M.2
Yin, Q.3
-
15
-
-
84906698210
-
Principles of physical layer security in multiuser wireless networks: A survey
-
Mar.
-
A. Mukherjee, S. Fakoorian, J. Huang, A. Swindlehurst, "Principles of physical layer security in multiuser wireless networks: A survey," IEEE Commun. Surveys Tuts., vol. 16, no. 3, pp. 1550-1573, Mar. 2014.
-
(2014)
IEEE Commun. Surveys Tuts.
, vol.16
, Issue.3
, pp. 1550-1573
-
-
Mukherjee, A.1
Fakoorian, S.2
Huang, J.3
Swindlehurst, A.4
-
16
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
Jun.
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
17
-
-
77958083375
-
Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation
-
Oct.
-
X. Zhou and M. R.McKay, "Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation," IEEE Trans. Veh. Technol., vol. 59, no. 8, pp. 3831-3842, Oct. 2010.
-
(2010)
IEEE Trans. Veh. Technol.
, vol.59
, Issue.8
, pp. 3831-3842
-
-
Zhou, X.1
McKay, M.R.2
-
18
-
-
84879203277
-
On the design of artificial-noiseaided secure multi-antenna transmission in slow fading channels
-
Jun.
-
X. Zhang, X. Zhou, M. R. McKay, "On the design of artificial-noiseaided secure multi-antenna transmission in slow fading channels," IEEE Trans. Veh. Technol., vol. 62, no. 5, pp. 2170-2181, Jun. 2013.
-
(2013)
IEEE Trans. Veh. Technol.
, vol.62
, Issue.5
, pp. 2170-2181
-
-
Zhang, X.1
Zhou, X.2
McKay, M.R.3
-
19
-
-
84866621680
-
A closed-form power allocation for minimizing secrecy outage probability for MISO wiretap channels via masked beamforming
-
Sep.
-
J. Xiong, K.-K. Wong, D. Ma, J. Wei, "A closed-form power allocation for minimizing secrecy outage probability for MISO wiretap channels via masked beamforming," IEEE Commum. Lett., vol. 16, no. 9, pp. 1496-1499, Sep. 2012.
-
(2012)
IEEE Commum. Lett.
, vol.16
, Issue.9
, pp. 1496-1499
-
-
Xiong, J.1
Wong, K.-K.2
Ma, D.3
Wei, J.4
-
20
-
-
84907000771
-
Artificial noise with optimal power allocation in multi-input single-output wiretap channels
-
Syndey, NSW, Australia
-
N. Yang, J. Yuan, R. Malaney, R. Subramanian, I. Land, "Artificial noise with optimal power allocation in multi-input single-output wiretap channels," in Proc. IEEE ICC, Syndey, NSW, Australia, 2014, pp. 2184-2190.
-
(2014)
Proc. IEEE ICC
, pp. 2184-2190
-
-
Yang, N.1
Yuan, J.2
Malaney, R.3
Subramanian, R.4
Land, I.5
-
21
-
-
79951595646
-
QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificialnoise-aided approach
-
Mar.
-
W.-C. Liao, T.-H. Chang, W.-K. Ma, C.-Y. Chi, "QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificialnoise-aided approach," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1202-1216, Mar. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.3
, pp. 1202-1216
-
-
Liao, W.-C.1
Chang, T.-H.2
Ma, W.-K.3
Chi, C.-Y.4
-
22
-
-
84861311185
-
Safe convex approximation to outagebased MISO secrecy rate optimization under imperfect CSI and with artificial noise
-
Nov.
-
Q. Li, W.-K. Ma, A. M.-C. So, "Safe convex approximation to outagebased MISO secrecy rate optimization under imperfect CSI and with artificial noise," in Proc. 45th Asilomar Conf. Signals, Syst. Comput., Nov. 2011, pp. 207-211.
-
(2011)
Proc. 45th Asilomar Conf. Signals, Syst. Comput.
, pp. 207-211
-
-
Li, Q.1
Ma, W.-K.2
So, A.M.-C.3
-
23
-
-
84883395475
-
Spatially selective artificial-noise aided transmit optimization for MISO multi-Eves secrecy rate maximization
-
May
-
Q. Li andW.-K.Ma, "Spatially selective artificial-noise aided transmit optimization for MISO multi-Eves secrecy rate maximization," IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2704-2717, May 2013.
-
(2013)
IEEE Trans. Signal Process.
, vol.61
, Issue.10
, pp. 2704-2717
-
-
Li, Q.1
Ma, W.-K.2
-
24
-
-
84903650326
-
On linear rrecoding strategies for secrecy rate maximization in multiuser multiantenna wireless networks
-
Jul.
-
M. F. Hanif, L.-N. Tran, M. Juntti, S. Glisic, "On linear rrecoding strategies for secrecy rate maximization in multiuser multiantenna wireless networks," IEEE Trans. Signal Process., vol. 62, no. 14, pp. 3536-3551, Jul. 2014.
-
(2014)
IEEE Trans. Signal Process.
, vol.62
, Issue.14
, pp. 3536-3551
-
-
Hanif, M.F.1
Tran, L.-N.2
Juntti, M.3
Glisic, S.4
-
25
-
-
79957978453
-
Stochastic geometry and random graphs for the analysis and design of wireless networks
-
Sep.
-
M. Haenggi, J.,rews, F. Baccelli, O. Dousse, M. Franceschetti, "Stochastic geometry and random graphs for the analysis and design of wireless networks," IEEE J. Sel. Areas Commun., vol. 27, no. 7, pp. 1029-1046, Sep. 2009.
-
(2009)
IEEE J. Sel. Areas Commun.
, vol.27
, Issue.7
, pp. 1029-1046
-
-
Haenggi, M.1
Rews, J.2
Baccelli, F.3
Dousse, O.4
Franceschetti, M.5
-
26
-
-
84860402665
-
On the throughput cost of physical layer security in decentralized wireless networks
-
Aug.
-
X. Zhou, R. Ganti, J.,rews, A. Hjørungnes, "On the throughput cost of physical layer security in decentralized wireless networks," IEEE Trans. Wireless Commun., vol. 10, no. 8, pp. 2764-2775, Aug. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.8
, pp. 2764-2775
-
-
Zhou, X.1
Ganti, R.2
Rews, J.3
Hjørungnes, A.4
-
27
-
-
84893266496
-
Secrecy outage in random wireless networks subjected to fading
-
Sep.
-
S. Vuppala and G. Abreu, "Secrecy outage in random wireless networks subjected to fading," in Proc. IEEE 24th Int. Symp. PIMRC, Sep. 2013, pp. 446-450.
-
(2013)
Proc. IEEE 24th Int. Symp. PIMRC
, pp. 446-450
-
-
Vuppala, S.1
Abreu, G.2
-
28
-
-
84880159277
-
Physical layer security in cellular networks: A stochastic geometry approach
-
Jun.
-
H. Wang, X. Zhou, M. C. Reed, "Physical layer security in cellular networks: A stochastic geometry approach," IEEE Trans. Wireless Commun., vol. 12, no. 6, pp. 2776-2787, Jun. 2013.
-
(2013)
IEEE Trans. Wireless Commun.
, vol.12
, Issue.6
, pp. 2776-2787
-
-
Wang, H.1
Zhou, X.2
Reed, M.C.3
-
29
-
-
79951681560
-
Secure wireless network connectivity with multi-antenna transmission
-
Feb.
-
X. Zhou, R. K. Ganti, J. G.,rews, "Secure wireless network connectivity with multi-antenna transmission," IEEE Trans. Wireless Commun., vol. 10, no. 2, pp. 425-430, Feb. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.2
, pp. 425-430
-
-
Zhou, X.1
Ganti, R.K.2
Rews, J.G.3
-
30
-
-
84906228732
-
On transmission secrecy outage of a multi-antenna system with randomly located eavesdroppers
-
Aug.
-
T.-X. Zheng, H.-M. Wang, Q. Yin, "On transmission secrecy outage of a multi-antenna system with randomly located eavesdroppers," IEEE Commun. Lett., vol. 18, no. 8, pp. 1299-1302, Aug. 2014.
-
(2014)
IEEE Commun. Lett.
, vol.18
, Issue.8
, pp. 1299-1302
-
-
Zheng, T.-X.1
Wang, H.-M.2
Yin, Q.3
-
31
-
-
84903148893
-
Physical layer security in downlink multi-antenna cellular networks
-
Jun.
-
G. Geraci, H. S. Dhillon, J. G.,rews, J. Yuan, I. B. Collings, "Physical layer security in downlink multi-antenna cellular networks," IEEE Trans. Commun., vol. 62, no. 6, pp. 2006-2021, Jun. 2014.
-
(2014)
IEEE Trans. Commun.
, vol.62
, Issue.6
, pp. 2006-2021
-
-
Geraci, G.1
Dhillon, H.S.2
Rews, J.G.3
Yuan, J.4
Collings, I.B.5
-
32
-
-
80051955278
-
Physical-layer secrecy of MIMO communications in the presence of a Poisson random field of eavesdroppers
-
Jun.
-
M. Ghogho and A. Swami, "Physical-layer secrecy of MIMO communications in the presence of a Poisson random field of eavesdroppers," in Proc. IEEE ICC Workshops, Jun. 2011, pp. 1-5.
-
(2011)
Proc. IEEE ICC Workshops
, pp. 1-5
-
-
Ghogho, M.1
Swami, A.2
-
33
-
-
84887058800
-
Enhancing secrecy with multiantenna transmission in wireless ad hoc networks
-
Nov.
-
X. Zhang, X. Zhou, M. R. McKay, "Enhancing secrecy with multiantenna transmission in wireless ad hoc networks," IEEE Trans. Inf. Forensics Security, vol. 8, no. 11, pp. 1802-1814, Nov. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.11
, pp. 1802-1814
-
-
Zhang, X.1
Zhou, X.2
McKay, M.R.3
-
34
-
-
73449104694
-
Compound wiretap channels
-
Y. Liang, G. Kramer, H. V. Poor, S. Shamai, "Compound wiretap channels," EURASIP J. Wireless Commun. Netw., vol. 2009, 2009, Art. ID. 142374.
-
(2009)
EURASIP J. Wireless Commun. Netw.
, vol.2009
-
-
Liang, Y.1
Kramer, G.2
Poor, H.V.3
Shamai, S.4
-
35
-
-
79952706123
-
Rethinking the secrecy outage formulation: A secure transmission design perspective
-
Mar.
-
X. Zhou, M. R. McKay, B. Maham, A. Hjørungnes, "Rethinking the secrecy outage formulation: A secure transmission design perspective," IEEE Commun. Lett., vol. 15, no. 3, pp. 302-304, Mar. 2011.
-
(2011)
IEEE Commun. Lett.
, vol.15
, Issue.3
, pp. 302-304
-
-
Zhou, X.1
McKay, M.R.2
Maham, B.3
Hjørungnes, A.4
-
36
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct.
-
P. Gopala, L. Lai, H. El Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.1
Lai, L.2
El Gamal, H.3
-
37
-
-
84884537599
-
Optimal relay selection for physical layer security in cooperative wireless networks
-
Oct.
-
Y. Zou, X.Wang,W. Shen, "Optimal relay selection for physical layer security in cooperative wireless networks," IEEE J. Sel. Areas Commun., vol. 31, no. 10, pp. 2099-2111, Oct. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.10
, pp. 2099-2111
-
-
Zou, Y.1
Wang, X.2
Shen, W.3
-
38
-
-
34548842009
-
Cardano and the solution of the cubic
-
Hoboken, NJ, USA: Wiley, Ch. 6
-
W. Dunham, "Cardano and the solution of the cubic," in Journey Through Genius: The Great Theorems of Mathematics. Hoboken, NJ, USA: Wiley, Ch. 6, 1990, pp. 133-154.
-
(1990)
Journey Through Genius: The Great Theorems of Mathematics
, pp. 133-154
-
-
Dunham, W.1
-
39
-
-
0003444918
-
-
Hoboken NJ USA: Wiley
-
D. Stoyan, W. Kendall, J. Mecke, Stochastic Geometry and Its Applications, 2nd ed. Hoboken, NJ, USA:Wiley, 1996.
-
(1996)
Stochastic Geometry and Its Applications 2nd Ed
-
-
Stoyan, D.1
Kendall, W.2
Mecke, J.3
-
40
-
-
0003498504
-
-
New York, NY, USA: Academic
-
I. S. Gradshteyn, I. M. Ryzhik, A. Jeffrey, D. Zwillinger, S. Technica, Table of Integrals, Series, Products, 7th ed. New York, NY, USA: Academic, 2007.
-
(2007)
Table of Integrals, Series, Products, 7th Ed
-
-
Gradshteyn, I.S.1
Ryzhik, I.M.2
Jeffrey, A.3
Zwillinger, D.4
Technica, S.5
|