-
1
-
-
84906698210
-
'Principles of physical-layer security in multiuser wireless networks: a survey'
-
Mukherjee, A., Fakoorian, S.A.A., Huang, J., et al.: 'Principles of physical-layer security in multiuser wireless networks: a survey'. Submitted to IEEE Commun. Surv. Tutor., 2013, 16, (3), pp. 1550-73.
-
(2013)
Submitted to IEEE Commun. Surv. Tutor
, vol.16
, Issue.3
, pp. 1550-1573
-
-
Mukherjee, A.1
Fakoorian, S.A.A.2
Huang, J.3
-
2
-
-
84906345040
-
'A secure and effective anonymous authentication scheme for roaming service in global mobility networks'
-
Zhao, D., Peng, H., Li, L., et al.: 'A secure and effective anonymous authentication scheme for roaming service in global mobility networks', Wirel. Pers. Commun., 2015, 78, (1), pp. 247-269.
-
(2015)
Wirel. Pers. Commun
, vol.78
, Issue.1
, pp. 247-269
-
-
Zhao, D.1
Peng, H.2
Li, L.3
-
3
-
-
0016562514
-
'The wire-tap channel'
-
Wyner, A.D.: 'The wire-tap channel', Bell Syst. Tech. J., 1975, 54, (8), pp. 1355-1387.
-
(1975)
Bell Syst. Tech. J
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
4
-
-
0017996501
-
'The Gaussian wire-tap channel'
-
Leung-Yan-Cheong, S.K., Hellman, M.E.: 'The Gaussian wire-tap channel', IEEE Trans. Inf. Theory, 1978, 24, (4), pp. 451-456.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.K.1
Hellman, M.E.2
-
5
-
-
66949180834
-
'A note on the secrecy capacity of the multiple-antenna wiretap channel'
-
Liu, T., Shamai (Shitz), S.: 'A note on the secrecy capacity of the multiple-antenna wiretap channel', IEEE Trans. Inf. Theory, 2009, 55, (6), pp. 2547-2553.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.6
, pp. 2547-2553
-
-
Liu, T.1
Shamai, S.2
-
6
-
-
77953802876
-
'Secure transmission with multiple antennas I: the MISOME wiretap channel'
-
Khisti, A., Wornell, G.W.: 'Secure transmission with multiple antennas I: the MISOME wiretap channel', IEEE Trans. Inf. Theory, 2010, 56, (7), pp. 3088-3104.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.7
, pp. 3088-3104
-
-
Khisti, A.1
Wornell, G.W.2
-
7
-
-
77958560746
-
'Secure transmission with multiple antennas -part II: the MIMOME wiretap channel'
-
Khisti, A., Wornell, G.W.: 'Secure transmission with multiple antennas -part II: the MIMOME wiretap channel', IEEE Trans. Inf. Theory, 2010, 56, (11), pp. 5515-5532.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.11
, pp. 5515-5532
-
-
Khisti, A.1
Wornell, G.W.2
-
8
-
-
79960996804
-
'The secrecy capacity of the MIMO wiretap channel'
-
Oggier, F., Hassibi, B.: 'The secrecy capacity of the MIMO wiretap channel', IEEE Trans. Inf. Theory, 2011, 57, (8), pp. 4961-4972.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.8
, pp. 4961-4972
-
-
Oggier, F.1
Hassibi, B.2
-
9
-
-
5044252003
-
'Cooperative diversity in wireless networks: efficient protocols and outage behavior'
-
Laneman, J.N., Tse, D.N.C., Wornell, G.W.: 'Cooperative diversity in wireless networks: efficient protocols and outage behavior', IEEE Trans. Inf. Theory, 2004, 50, (12), pp. 3062-3080.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.12
, pp. 3062-3080
-
-
Laneman, J.N.1
Tse, D.N.C.2
Wornell, G.W.3
-
10
-
-
84941267713
-
'Joint relay selection and cooperative beamforming in two-hop multi-relay decode-and-forward networks'
-
Moharre, H., Olfat, A.: 'Joint relay selection and cooperative beamforming in two-hop multi-relay decode-and-forward networks', IET Commun., 2014, 8, (18), pp. 3245-3253.
-
(2014)
IET Commun
, vol.8
, Issue.18
, pp. 3245-3253
-
-
Moharre, H.1
Olfat, A.2
-
11
-
-
45849133457
-
'Guaranteeing secrecy using artificial noise'
-
Goel, S., Negi, R.: 'Guaranteeing secrecy using artificial noise', IEEE Trans. Wirel. Commun., 2008, 7, (6), pp. 2180-2189.
-
(2008)
IEEE Trans. Wirel. Commun
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
12
-
-
70350583050
-
'Relay selection for secure cooperative networks with jamming'
-
Krikidis, I., Thompson, J.S., McLaughlin, S.: 'Relay selection for secure cooperative networks with jamming', IEEE Trans. Wirel. Commun., 2009, 8, (10), pp. 5003-5011.
-
(2009)
IEEE Trans. Wirel. Commun
, vol.8
, Issue.10
, pp. 5003-5011
-
-
Krikidis, I.1
Thompson, J.S.2
McLaughlin, S.3
-
13
-
-
84922896499
-
'Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks'
-
Wang, C., Wang, H.-M., Xia, X.-G.: 'Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks', IEEE Trans. Wirel. Commun., 2015, 14, (2), pp. 589-605.
-
(2015)
IEEE Trans. Wirel. Commun
, vol.14
, Issue.2
, pp. 589-605
-
-
Wang, C.1
Wang, H.-M.2
Xia, X.-G.3
-
14
-
-
84862635573
-
'Distributed beamforming for physical-layer security of two-way relay networks'
-
Wang, H.-M., Yin, Q., Xia, X.-G.: 'Distributed beamforming for physical-layer security of two-way relay networks', IEEE Trans. Signal Process., 2012, 60, (7), pp. 3532-3545.
-
(2012)
IEEE Trans. Signal Process
, vol.60
, Issue.7
, pp. 3532-3545
-
-
Wang, H.-M.1
Yin, Q.2
Xia, X.-G.3
-
15
-
-
84888318377
-
'Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks'
-
Wang, H.-M., Luo, M., Yin, Q., et al.: 'Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks', IEEE Trans. Inf. Forensics Sec., 2013, 8, (12), pp. 2007-2020.
-
(2013)
IEEE Trans. Inf. Forensics Sec
, vol.8
, Issue.12
, pp. 2007-2020
-
-
Wang, H.-M.1
Luo, M.2
Yin, Q.3
-
16
-
-
84883373418
-
'Destination assisted secret wireless communication with cooperative helpers'
-
Yang, B., Wang, W., Yao, B., et al.: 'Destination assisted secret wireless communication with cooperative helpers', IEEE Signal Process. Lett., 2013, 20, (11), pp. 1032-1035.
-
(2013)
IEEE Signal Process. Lett
, vol.20
, Issue.11
, pp. 1032-1035
-
-
Yang, B.1
Wang, W.2
Yao, B.3
-
17
-
-
84929839413
-
'Secure cooperative communication via artificial noise for wireless two-hop relaying networks'
-
Zhou, N.R., Kang, Z.J., Liang, X.R.: 'Secure cooperative communication via artificial noise for wireless two-hop relaying networks', Wirel. Pers. Commun., 2015, 82, (3), pp. 1759-1771.
-
(2015)
Wirel. Pers. Commun
, vol.82
, Issue.3
, pp. 1759-1771
-
-
Zhou, N.R.1
Kang, Z.J.2
Liang, X.R.3
-
18
-
-
79951618084
-
'Optimal cooperative jamming to enhance physical layer security using relays'
-
Zheng, G., Choo, L.-C., Wong, K.-K.: 'Optimal cooperative jamming to enhance physical layer security using relays', IEEE Trans. Signal Process., 2011, 59, (3), pp. 1317-1322.
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.3
, pp. 1317-1322
-
-
Zheng, G.1
Choo, L.-C.2
Wong, K.-K.3
-
19
-
-
80052870842
-
'On cooperative relaying schemes for wireless physical layer security'
-
Li, J., Petropulu, A.P., Weber, S.: 'On cooperative relaying schemes for wireless physical layer security', IEEE Trans. Signal Process., 2011, 59, (10), pp. 4985-4997.
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.10
, pp. 4985-4997
-
-
Li, J.1
Petropulu, A.P.2
Weber, S.3
-
20
-
-
84861311131
-
'Joint decode-and-forward and jamming for wireless physical layer security with destination assistance'
-
Pacific Grove, USA, November
-
Liu, Y., Petropulu, A.P., Poor, H.V.: 'Joint decode-and-forward and jamming for wireless physical layer security with destination assistance'. Proc. of Asilomar Conf. on Signals, Systems and Computer (ASILOMAR'11), Pacific Grove, USA, November 2011.
-
(2011)
Proc. of Asilomar Conf. on Signals, Systems and Computer (ASILOMAR'11)
-
-
Liu, Y.1
Petropulu, A.P.2
Poor, H.V.3
-
21
-
-
80052889357
-
'Cooperative jamming for secure communications in MIMO relay networks'
-
Huang, J., Swindlehurst, A.L.: 'Cooperative jamming for secure communications in MIMO relay networks', IEEE J. Sel. Areas Commun., 2011, 59, (10), pp. 4871-4884.
-
(2011)
IEEE J. Sel. Areas Commun
, vol.59
, Issue.10
, pp. 4871-4884
-
-
Huang, J.1
Swindlehurst, A.L.2
-
22
-
-
79551623225
-
'Improving wireless physical layer security via cooperating relays'
-
Dong, L., Han, Z., Petropulu, A.P., et al.: 'Improving wireless physical layer security via cooperating relays', IEEE Trans. Signal Process., 2010, 58, (3), pp. 1875-1888.
-
(2010)
IEEE Trans. Signal Process
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
-
23
-
-
84856271363
-
'On the application of cooperative transmission to secrecy communications'
-
Ding, Z., Leung, K.K., Goeckel, D.L., et al.: 'On the application of cooperative transmission to secrecy communications', IEEE J. Sel. Areas Commun., 2012, 30, (2), pp. 359-368.
-
(2012)
IEEE J. Sel. Areas Commun
, vol.30
, Issue.2
, pp. 359-368
-
-
Ding, Z.1
Leung, K.K.2
Goeckel, D.L.3
-
24
-
-
84555190397
-
'Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system'
-
Jeong, C., Kim, I.-M., Kim, D.I.: 'Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system', IEEE Trans. Signal Process., 2012, 60, (1), pp. 310-325.
-
(2012)
IEEE Trans. Signal Process
, vol.60
, Issue.1
, pp. 310-325
-
-
Jeong, C.1
Kim, I.-M.2
Kim, D.I.3
-
25
-
-
84904282993
-
'Joint source-relay precoding and power allocation for secure amplify-and-forward MIMO relay networks'
-
Wang, H.-M., Liu, F., Xia, X.-G.: 'Joint source-relay precoding and power allocation for secure amplify-and-forward MIMO relay networks', IEEE Trans. Inf. Forensics Sec., 2014, 9, (8), pp. 1240-1250.
-
(2014)
IEEE Trans. Inf. Forensics Sec
, vol.9
, Issue.8
, pp. 1240-1250
-
-
Wang, H.-M.1
Liu, F.2
Xia, X.-G.3
-
26
-
-
84930197364
-
'Outage constrained secrecy throughput maximization for DF relay networks'
-
Zheng, T.-X., Wang, H.-M., Liu, F., et al.: 'Outage constrained secrecy throughput maximization for DF relay networks', IEEE Trans. Commun., 2015, 63, (5), pp. 1741-1755.
-
(2015)
IEEE Trans. Commun
, vol.63
, Issue.5
, pp. 1741-1755
-
-
Zheng, T.-X.1
Wang, H.-M.2
Liu, F.3
-
27
-
-
84906228732
-
'On transmission secrecy outage of multi-antenna system with randomly located eavesdroppers'
-
Zheng, T., Wang, H.-M., Yin, Q.: 'On transmission secrecy outage of multi-antenna system with randomly located eavesdroppers', IEEE Commun. Lett., 2014, 18, (8), pp. 1299-1302.
-
(2014)
IEEE Commun. Lett
, vol.18
, Issue.8
, pp. 1299-1302
-
-
Zheng, T.1
Wang, H.-M.2
Yin, Q.3
-
28
-
-
84877718412
-
'Secure communication via an untrusted non-regenerative relay in fading channels'
-
Huang, J., Mukherjee, A., Swindlehurst, A.L.: 'Secure communication via an untrusted non-regenerative relay in fading channels', IEEE Trans. Signal Process., 2013, 61, (10), pp. 2536-2550.
-
(2013)
IEEE Trans. Signal Process
, vol.61
, Issue.10
, pp. 2536-2550
-
-
Huang, J.1
Mukherjee, A.2
Swindlehurst, A.L.3
-
29
-
-
80051752373
-
Two-hop secure communication using an untrusted relay: a case for cooperative jamming
-
New Orleans, LA, December
-
He, X., Yener, A.: 'Two-hop secure communication using an untrusted relay: a case for cooperative jamming'. Proc. of IEEE Globecom, New Orleans, LA, December 2008, pp. 1-5.
-
(2008)
Proc. of IEEE Globecom
, pp. 1-5
-
-
He, X.1
Yener, A.2
-
30
-
-
76649123145
-
'Two-hop secure communication using an untrusted relay'
-
He, X., Yener, A.: 'Two-hop secure communication using an untrusted relay', EURASIP J. Wirel. Commun. Netw., 2009, p. 13, Article ID 305146, doi: 10.1155/2009/305146.
-
(2009)
EURASIP J. Wirel. Commun. Netw
, pp. 13
-
-
He, X.1
Yener, A.2
-
31
-
-
77954584734
-
'Cooperation with an untrusted relay: a secrecy perspective'
-
He, X., Yener, A.: 'Cooperation with an untrusted relay: a secrecy perspective', IEEE Trans. Inf. Theory, 2010, (8), pp. 3807-3827.
-
(2010)
IEEE Trans. Inf. Theory
, Issue.8
, pp. 3807-3827
-
-
He, X.1
Yener, A.2
-
32
-
-
84871947779
-
'Outage performance for amplify-and-forward channels with an unauthenticated relay'
-
Huang, J., Mukherjee, A., Swindlehurst, A.L.: 'Outage performance for amplify-and-forward channels with an unauthenticated relay'. Proc. of 2012 IEEE Int. Communication Conf., pp. 893-897.
-
Proc. of 2012 IEEE Int. Communication Conf
, pp. 893-897
-
-
Huang, J.1
Mukherjee, A.2
Swindlehurst, A.L.3
-
33
-
-
84867602642
-
'Secrecy analysis of unauthenticated amplify-and-forward relaying with antenna selection'
-
Huang, J., Mukherjee, A., Swindlehurst, A.L.: 'Secrecy analysis of unauthenticated amplify-and-forward relaying with antenna selection'. Proc. of 2012 IEEE Acoustics, Speech and Signal Processing, pp. 2481-2484.
-
Proc. of 2012 IEEE Acoustics, Speech and Signal Processing
, pp. 2481-2484
-
-
Huang, J.1
Mukherjee, A.2
Swindlehurst, A.L.3
-
34
-
-
84903317482
-
'Secure transmission with optimal power allocation in untrusted relay networks'
-
Wang, L., Elkashlan, M., Huang, J., et al.: 'Secure transmission with optimal power allocation in untrusted relay networks', IEEE Wirel. Commun. Lett., 2014, 3, (3), pp. 289-292.
-
(2014)
IEEE Wirel. Commun. Lett
, vol.3
, Issue.3
, pp. 289-292
-
-
Wang, L.1
Elkashlan, M.2
Huang, J.3
-
35
-
-
84867800602
-
'Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes'
-
Sun, L., Zhang, T., Li, Y., et al.: 'Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes', IEEE Trans. Veh. Technol., 2012, 61, (8), pp. 3801-3807.
-
(2012)
IEEE Trans. Veh. Technol
, vol.61
, Issue.8
, pp. 3801-3807
-
-
Sun, L.1
Zhang, T.2
Li, Y.3
-
36
-
-
84924902824
-
'Security-aware relaying scheme for cooperative networks with untrusted relay nodes'
-
Sun, L., Ren, P., Du, Q., et al.: 'Security-aware relaying scheme for cooperative networks with untrusted relay nodes', IEEE Commun. Lett., 2014, 19, (3), pp. 463-466.
-
(2014)
IEEE Commun. Lett
, vol.19
, Issue.3
, pp. 463-466
-
-
Sun, L.1
Ren, P.2
Du, Q.3
-
37
-
-
84894546899
-
'Secrecy rate of two-hop AF relaying networks with an untrusted relay'
-
Zhou, N., Chen, X., Li, C., et al.: 'Secrecy rate of two-hop AF relaying networks with an untrusted relay', Wirel. Pers. Commun., 2014, 75, (1), pp. 119-129.
-
(2014)
Wirel. Pers. Commun
, vol.75
, Issue.1
, pp. 119-129
-
-
Zhou, N.1
Chen, X.2
Li, C.3
-
38
-
-
84877926659
-
'Energy and spectral efficiency of very large multiuser MIMO systems'
-
Ngo, H.Q., Larsson, E.G., Marzetta, T.L.: 'Energy and spectral efficiency of very large multiuser MIMO systems', IEEE Trans. Commun., 2013, 61, (4), pp. 1436-1449.
-
(2013)
IEEE Trans. Commun
, vol.61
, Issue.4
, pp. 1436-1449
-
-
Ngo, H.Q.1
Larsson, E.G.2
Marzetta, T.L.3
-
39
-
-
35448931484
-
'Cooperative communications with outage-optimal opportunistic relaying'
-
Bletsas, A., Shin, H., Win, M.Z.: 'Cooperative communications with outage-optimal opportunistic relaying', IEEE Trans. Wirel. Commun., 2007, 6, (9), pp. 3450-3460.
-
(2007)
IEEE Trans. Wirel. Commun
, vol.6
, Issue.9
, pp. 3450-3460
-
-
Bletsas, A.1
Shin, H.2
Win, M.Z.3
-
40
-
-
7544225775
-
'Exact symbol error probability of a cooperative network in a Rayleigh-fading environment'
-
Anghel, P.A., Kaveh, M.: 'Exact symbol error probability of a cooperative network in a Rayleigh-fading environment', IEEE Trans. Wirel. Commun., 2004, 3, (5), pp. 1416-1421.
-
(2004)
IEEE Trans. Wirel. Commun
, vol.3
, Issue.5
, pp. 1416-1421
-
-
Anghel, P.A.1
Kaveh, M.2
-
41
-
-
0003498504
-
-
(Academic, New York, 7th edn.)
-
Gradshteyn, I.S., Ryzhik, I.M.: 'Table of integrals, series, and products' (Academic, New York, 2007, 7th edn.).
-
(2007)
'Table of integrals, series, and products'
-
-
Gradshteyn, I.S.1
Ryzhik, I.M.2
-
42
-
-
0038363341
-
'Diversity and multiplexing: a fundamental tradeoff in multiple-antenna channels'
-
Zheng, L., Tse, D.N.C.: 'Diversity and multiplexing: a fundamental tradeoff in multiple-antenna channels', IEEE Trans. Inf. Theory., 2003, 49, (5), pp. 1073-1096.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.5
, pp. 1073-1096
-
-
Zheng, L.1
Tse, D.N.C.2
|