-
2
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. Wyner, "The Wire-Tap Channel," Bell Sys. Tech. J., vol. 54, no. 87, Oct. 1975, pp. 1355-87.
-
(1975)
Bell Sys. Tech. J.
, vol.54
, Issue.87
, pp. 1355-1387
-
-
Wyner, A.1
-
3
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar.
-
L. Dong et al., "Improving Wireless Physical Layer Security via Cooperating Relays," IEEE Trans. Signal Processing, vol. 58, no. 3, Mar. 2010, pp. 1875-88.
-
(2010)
IEEE Trans. Signal Processing
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
-
4
-
-
77954584734
-
Cooperation with an untrusted relay: A secrecy perspective
-
Aug.
-
X. He and A. Yener, "Cooperation with an Untrusted Relay: A Secrecy Perspective," IEEE Trans. Info. Theory, vol. 56, no. 8, Aug. 2010, pp. 3807-27.
-
(2010)
IEEE Trans. Info. Theory
, vol.56
, Issue.8
, pp. 3807-3827
-
-
He, X.1
Yener, A.2
-
5
-
-
84867800602
-
Performance study of two-hop ampli-fy-and-forward systems with untrustworthy relay nodes
-
Oct.
-
L. Sun et al., "Performance Study of Two-Hop Ampli-fy-and-Forward Systems with Untrustworthy Relay Nodes," IEEE Trans. Vehic. Tech., vol. 61, no. 8, Oct. 2012, pp. 3801-07.
-
(2012)
IEEE Trans. Vehic. Tech.
, vol.61
, Issue.8
, pp. 3801-3807
-
-
Sun, L.1
-
6
-
-
84555190397
-
Joint secure beam-forming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system
-
Jan.
-
C. Jeong, I.-M. Kim, and D. I. Kim, "Joint Secure Beam-forming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System," IEEE Trans. Signal Processing, vol. 60, no. 1, Jan. 2012, pp. 310-25.
-
(2012)
IEEE Trans. Signal Processing
, vol.60
, Issue.1
, pp. 310-325
-
-
Jeong, C.1
Kim, I.-M.2
Kim, D.I.3
-
7
-
-
84898039745
-
Secure beamforming for MIMO two-way communications with an untrusted relay
-
May
-
J. Mo et al., "Secure Beamforming for MIMO Two-Way Communications with an Untrusted Relay," IEEE Trans. Signal Processing, vol. 62, no. 9, May 2014, pp. 2185-99.
-
(2014)
IEEE Trans. Signal Processing
, vol.62
, Issue.9
, pp. 2185-2199
-
-
Mo, J.1
-
8
-
-
84873099749
-
End-to-end secure multi-hop communication with untrusted relays
-
Jan.
-
X. He and A. Yener, "End-to-End Secure Multi-Hop Communication with Untrusted Relays," IEEE Trans. Wireless Commun., vol. 12, no. 1, Jan. 2013, pp. 1-11.
-
(2013)
IEEE Trans. Wireless Commun.
, vol.12
, Issue.1
, pp. 1-11
-
-
He, X.1
Yener, A.2
-
9
-
-
84877718412
-
Secure communication via an untrusted non-regenerative relay in fading channels
-
May
-
J. Huang, A. Mukherjee, and A. L. Swindlehurst, "Secure Communication via an Untrusted Non-Regenerative Relay in Fading Channels," IEEE Trans. Signal Processing, vol. 61, no. 10, May 2013, pp. 2536-50.
-
(2013)
IEEE Trans. Signal Processing
, vol.61
, Issue.10
, pp. 2536-2550
-
-
Huang, J.1
Mukherjee, A.2
Swindlehurst, A.L.3
-
10
-
-
70349175144
-
Analyzing amplify-and-forward and decode-and-forward cooperative strategies in wyner's channel model
-
Apr.
-
P. Zhang et al., "Analyzing Amplify-and-Forward and Decode-and-Forward Cooperative Strategies in Wyner's Channel Model," Proc. IEEE WCNC, Apr. 2009, pp. 1-5.
-
(2009)
Proc. IEEE WCNC
, pp. 1-5
-
-
Zhang, P.1
-
11
-
-
84862963131
-
Joint relay and jammer selection for secure two-way relay networks
-
Feb.
-
J. Chen et al., "Joint Relay and Jammer Selection for Secure Two-Way Relay Networks," IEEE Trans. Info. Forensics Security, vol. 7, no. 1, Feb. 2012, pp. 310-20.
-
(2012)
IEEE Trans. Info. Forensics Security
, vol.7
, Issue.1
, pp. 310-320
-
-
Chen, J.1
-
12
-
-
45849133457
-
Guaranteeing secrecy using arti-fcial noise
-
June
-
S. Goel and R. Negi, "Guaranteeing Secrecy Using Arti-fcial Noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, June 2008, pp. 2180-89.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
13
-
-
84876796391
-
Destination assisted cooperative jamming for wireless physical-layer security
-
Apr.
-
Y. Liu, J. Li, and A. Petropulu, "Destination Assisted Cooperative Jamming for Wireless Physical-Layer Security," IEEE Trans. Info. Forensics Security, vol. 8, no. 4, Apr. 2013, pp. 682-94.
-
(2013)
IEEE Trans. Info. Forensics Security
, vol.8
, Issue.4
, pp. 682-694
-
-
Liu, Y.1
Li, J.2
Petropulu, A.3
-
14
-
-
84939229063
-
Improving wireless secrecy rate via full-duplex relay-assisted protocols
-
Oct.
-
S. Parsaeefard and T. Le-Ngoc, "Improving Wireless Secrecy Rate via Full-Duplex Relay-Assisted Protocols", IEEE Trans. Info. Forensics & Security, vol. 10, no. 10, Oct. 2015, pp. 2095-2107.
-
(2015)
IEEE Trans. Info. Forensics & Security
, vol.10
, Issue.10
, pp. 2095-2107
-
-
Parsaeefard, S.1
Le-Ngoc, T.2
-
15
-
-
84865478919
-
Semantic security for the wiretap channel
-
Lecture Notes in Computer Science Springer-Verlag
-
M. Bellare, S. Tessaro, and A. Vardy, "Semantic Security for the Wiretap Channel," Advances in Cryptology-CRYPTO 2012, Lecture Notes in Computer Science, vol. 7417, Springer-Verlag, pp. 294-311.
-
(2012)
Advances in Cryptology-CRYPTO
, vol.7417
, pp. 294-311
-
-
Bellare, M.1
Tessaro, S.2
Vardy, A.3
|