-
1
-
-
0024012644
-
An introduction to contemporary cryptology
-
May
-
J. L. Massey, "An introduction to contemporary cryptology," Proc. IEEE, vol. 76, no. 5, pp. 533-549, May 1988.
-
(1988)
Proc. IEEE
, vol.76
, Issue.5
, pp. 533-549
-
-
Massey, J.L.1
-
2
-
-
84890522850
-
Communication theory of secrecy systems
-
Oct.
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, no. 4, pp. 656-715, Oct. 1949.
-
(1949)
Bell Syst. Tech. J.
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
-
3
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
4
-
-
84923287820
-
On the secrecy capacity of block fading channels with a hybrid adversary
-
Mar.
-
Y. O. Basciftci, O. Gungor, C. E. Koksal, and F. Ozguner, "On the secrecy capacity of block fading channels with a hybrid adversary," IEEE Trans. Inf. Theory, vol. 61, no. 3, pp. 1325-1343, Mar. 2015.
-
(2015)
IEEE Trans. Inf. Theory
, vol.61
, Issue.3
, pp. 1325-1343
-
-
Basciftci, Y.O.1
Gungor, O.2
Koksal, C.E.3
Ozguner, F.4
-
5
-
-
39049144353
-
Secrecy capacity of wireless channels
-
Jul.
-
J. Barros and M. R. D. Rodrigues, "Secrecy capacity of wireless channels," in Proc. IEEE ISIT, Jul. 2006, pp. 356-360.
-
(2006)
Proc. IEEE ISIT
, pp. 356-360
-
-
Barros, J.1
Rodrigues, M.R.D.2
-
6
-
-
79952822109
-
Bounds on secrecy capacity over correlated ergodic fading channels at high SNR
-
Apr.
-
H. Jeon, N. Kim, J. Choi, H. Lee, and J. Ha, "Bounds on secrecy capacity over correlated ergodic fading channels at high SNR," IEEE Trans. Inf. Theory, vol. 57, no. 4, pp. 1975-1983, Apr. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.4
, pp. 1975-1983
-
-
Jeon, H.1
Kim, N.2
Choi, J.3
Lee, H.4
Ha, J.5
-
7
-
-
0017996501
-
The Gaussian wire-tap channel
-
Jul.
-
S. Leung-Yan-Cheong and M. E. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, Jul. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.1
Hellman, M.E.2
-
8
-
-
84890121948
-
Performance analysis for physical layer security in multi-antenna downlink networks with limited CSI feedback
-
Oct.
-
X. Chen and R. Yin, "Performance analysis for physical layer security in multi-antenna downlink networks with limited CSI feedback," IEEE Wireless Commun. Lett., vol. 2, no. 5, pp. 503-506, Oct. 2013.
-
(2013)
IEEE Wireless Commun. Lett.
, vol.2
, Issue.5
, pp. 503-506
-
-
Chen, X.1
Yin, R.2
-
9
-
-
84941722281
-
Secure and green SWIPT in distributed antenna networks with limited backhaul capacity
-
Sep.
-
D. W. K. Ng and R. Schober, "Secure and green SWIPT in distributed antenna networks with limited backhaul capacity," IEEE Trans. Wireless Commun., vol. 14, no. 9, pp. 5082-5097, Sep. 2015.
-
(2015)
IEEE Trans. Wireless Commun.
, vol.14
, Issue.9
, pp. 5082-5097
-
-
Ng, D.W.K.1
Schober, R.2
-
10
-
-
84863908572
-
Linear precoding for finitealphabet signaling over MIMOME wiretap channels
-
Jul.
-
Y. Wu, C. Xiao, Z. Ding, X. Gao, and S. Jin, "Linear precoding for finitealphabet signaling over MIMOME wiretap channels," IEEE Trans. Veh. Technol., vol. 61, no. 6, pp. 2599-2612, Jul. 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.6
, pp. 2599-2612
-
-
Wu, Y.1
Xiao, C.2
Ding, Z.3
Gao, X.4
Jin, S.5
-
11
-
-
84906698210
-
Principles of physical layer security in multiuser wireless networks: A survey
-
Aug.
-
A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst, "Principles of physical layer security in multiuser wireless networks: A survey," IEEE Commun. Surveys Tuts., vol. 16, no. 3, pp. 1550-1573, Aug. 2014.
-
(2014)
IEEE Commun. Surveys Tuts.
, vol.16
, Issue.3
, pp. 1550-1573
-
-
Mukherjee, A.1
Fakoorian, S.A.A.2
Huang, J.3
Swindlehurst, A.L.4
-
12
-
-
84903595688
-
Robust beamforming for secure communication in systems with wireless information and power transfer
-
Aug.
-
D. W. K. Ng, E. S. Lo, and R. Schober, "Robust beamforming for secure communication in systems with wireless information and power transfer," IEEE Trans. Wireless Commun., vol. 13, no. 8, pp. 4599-4615, Aug. 2014.
-
(2014)
IEEE Trans. Wireless Commun.
, vol.13
, Issue.8
, pp. 4599-4615
-
-
Ng, D.W.K.1
Lo, E.S.2
Schober, R.3
-
13
-
-
77953802876
-
Secure transmission with multiple antennas-part I: The MIMOME wiretap channel
-
Jul.
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas-Part I: The MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, Jul. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.7
, pp. 3088-3104
-
-
Khisti, A.1
Wornell, G.W.2
-
14
-
-
77958560746
-
Secure transmission with multiple antennas-part II: The MIMOME wiretap channel
-
Nov.
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas-Part II: The MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.11
, pp. 5515-5532
-
-
Khisti, A.1
Wornell, G.W.2
-
15
-
-
80052870842
-
On cooperative relaying schemes for wireless physical layer security
-
Oct.
-
J. Li, A. P. Petropulu, and S. Weber, "On cooperative relaying schemes for wireless physical layer security," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 4985-4997, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.3
, pp. 4985-4997
-
-
Li, J.1
Petropulu, A.P.2
Weber, S.3
-
16
-
-
84884537599
-
Optimal relay selection for physicallayer security in cooperative wireless networks
-
Oct.
-
Y. Zou, X. Wang, and W. Shen, "Optimal relay selection for physicallayer security in cooperative wireless networks," IEEE J. Sel. Areas Commun., vol. 31, no. 10, pp. 2099-2111, Oct. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.10
, pp. 2099-2111
-
-
Zou, Y.1
Wang, X.2
Shen, W.3
-
17
-
-
84963979497
-
Physical layer security in three-tier wireless sensor networks: A stochastic geometry approach
-
Jun.
-
Y. Deng, L. Wang, M. Elkashlan, A. Nallanathan, and R. K. Mallik, "Physical layer security in three-tier wireless sensor networks: A stochastic geometry approach," IEEE Trans. Inf. Forensics Security, vol. 11, no. 6, pp. 1128-1138, Jun. 2016, doi: 10.1109/TIFS.2016.2516917.
-
(2016)
IEEE Trans. Inf. Forensics Security
, vol.11
, Issue.6
, pp. 1128-1138
-
-
Deng, Y.1
Wang, L.2
Elkashlan, M.3
Nallanathan, A.4
Mallik, R.K.5
-
18
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
19
-
-
84921773816
-
Secure relay and jammer selection for physical layer security
-
Aug.
-
H. Hui, A. L. Swindlehurst, G. Li, and J. Liang, "Secure relay and jammer selection for physical layer security," IEEE Signal Process. Lett., vol. 22, no. 8, pp. 1147-1151, Aug. 2015.
-
(2015)
IEEE Signal Process. Lett.
, vol.22
, Issue.8
, pp. 1147-1151
-
-
Hui, H.1
Swindlehurst, A.L.2
Li, G.3
Liang, J.4
-
20
-
-
84961839468
-
Multi-antenna relay aided wireless physical layer security
-
Dec.
-
X. Chen, C. Zhong, C. Yuen, and H.-H. Chen, "Multi-antenna relay aided wireless physical layer security," IEEE Commun. Mag., vol. 53, no. 12, pp. 40-46, Dec. 2015.
-
(2015)
IEEE Commun. Mag.
, vol.53
, Issue.12
, pp. 40-46
-
-
Chen, X.1
Zhong, C.2
Yuen, C.3
Chen, H.-H.4
-
21
-
-
84555190397
-
Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system
-
Jan.
-
C. Jeong, I.-M. Kim, and D. Kim, "Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system," IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310-325, Jan. 2012.
-
(2012)
IEEE Trans. Signal Process
, vol.60
, Issue.1
, pp. 310-325
-
-
Jeong, C.1
Kim, I.-M.2
Kim, D.3
-
22
-
-
80052889357
-
Cooperative jamming for secure communications in MIMO relay networks
-
Oct.
-
J. Huang and A. L. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Trans. Signal Process., vol. 39, no. 10, pp. 4871-4884, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process
, vol.39
, Issue.10
, pp. 4871-4884
-
-
Huang, J.1
Swindlehurst, A.L.2
-
23
-
-
84917671161
-
Robust cooperative beamforming and artificial noise design for physical-layer secrecy in AF multi-antenna multi-relay networks
-
Jan.
-
Q. Li, Y. Yang, W.-K. Ma, M. Lin, J. Ge, and J. Lin, "Robust cooperative beamforming and artificial noise design for physical-layer secrecy in AF multi-antenna multi-relay networks," IEEE Trans. Signal Process., vol. 63, no. 1, pp. 206-220, Jan. 2015.
-
(2015)
IEEE Trans. Signal Process
, vol.63
, Issue.1
, pp. 206-220
-
-
Li, Q.1
Yang, Y.2
Ma, W.-K.3
Lin, M.4
Ge, J.5
Lin, J.6
-
24
-
-
84870512709
-
Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no Eavesdropper's CSI
-
Jan.
-
H.-M. Wang, M. Luo, X.-G. Xia, and Q. Yin, "Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's CSI," IEEE Signal Process. Lett., vol. 20, no. 1, pp. 39-42, Jan. 2013.
-
(2013)
IEEE Signal Process. Lett.
, vol.20
, Issue.1
, pp. 39-42
-
-
Wang, H.-M.1
Luo, M.2
Xia, X.-G.3
Yin, Q.4
-
25
-
-
84887058800
-
Enhancing secrecy with multiantenna transmission in wireless ad hoc networks
-
Nov.
-
X. Zhang, X. Zhou, and R. M. McKay, "Enhancing secrecy with multiantenna transmission in wireless ad hoc networks," IEEE Trans. Inf. Forensics Security, vol. 8, no. 11, pp. 1802-1814, Nov. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.11
, pp. 1802-1814
-
-
Zhang, X.1
Zhou, X.2
McKay, R.M.3
-
26
-
-
84953729290
-
On the security of large scale spectrum sharing networks
-
Jun.
-
Y. Deng, L. Wang, S. A. R. Zaidi, J. Yuan, and M. Elkashlan, "On the security of large scale spectrum sharing networks," in Proc. IEEE ICC, Jun. 2015, pp. 4877-4882.
-
(2015)
Proc. IEEE ICC
, pp. 4877-4882
-
-
Deng, Y.1
Wang, L.2
Zaidi, S.A.R.3
Yuan, J.4
Elkashlan, M.5
-
27
-
-
84910151930
-
Physical layer security in multi-cell MISO downlinks with incomplete CSI-A unified secrecy performance analysis
-
Dec.
-
X. Chen and H.-H. Chen, "Physical layer security in multi-cell MISO downlinks with incomplete CSI-A unified secrecy performance analysis," IEEE Trans. Signal Process., vol. 62, no. 23, pp. 6286-6297, Dec. 2014.
-
(2014)
IEEE Trans. Signal Process
, vol.62
, Issue.23
, pp. 6286-6297
-
-
Chen, X.1
Chen, H.-H.2
-
28
-
-
84907195591
-
Secure transmission in multicell massive MIMO systems
-
Sep.
-
J. Zhu, R. Schober, and V. K. Bhargava, "Secure transmission in multicell massive MIMO systems," IEEE Trans. Wireless Commun., vol. 13, no. 9, pp. 4766-4781, Sep. 2014.
-
(2014)
IEEE Trans. Wireless Commun.
, vol.13
, Issue.9
, pp. 4766-4781
-
-
Zhu, J.1
Schober, R.2
Bhargava, V.K.3
-
29
-
-
84969998525
-
Secure massive MIMO transmission with an active eavesdropper
-
[Online]
-
Y. Wu, R. Schober, D. W. K. Ng, C. Xiao, and G. Caire, "Secure massive MIMO transmission with an active eavesdropper," IEEE Trans. Inf. Theory, 2016. [Online]. Available: http://arxiv.org/abs/1507.00789
-
(2016)
IEEE Trans. Inf. Theory
-
-
Wu, Y.1
Schober, R.2
Ng, D.W.K.3
Xiao, C.4
Caire, G.5
-
30
-
-
84963567995
-
Linear precoding of data and artificial noise in secure massive MIMO systems
-
Mar.
-
J. Zhu, R. Schober, and V. K. Bhargava, "Linear precoding of data and artificial noise in secure massive MIMO systems," IEEE Trans. Wireless Commun., vol. 15, no. 3, pp. 2245-2261, Mar. 2016.
-
(2016)
IEEE Trans. Wireless Commun.
, vol.15
, Issue.3
, pp. 2245-2261
-
-
Zhu, J.1
Schober, R.2
Bhargava, V.K.3
-
31
-
-
84946607375
-
Large-scale MIMO relaying techniques for physical layer security: AF or DF?
-
Sep.
-
X. Chen, L. Lei, H. Zhang, and C. Yuen, "Large-scale MIMO relaying techniques for physical layer security: AF or DF?" IEEE Trans. Wireless Commun., vol. 14, no. 9, pp. 5135-5146, Sep. 2015.
-
(2015)
IEEE Trans. Wireless Commun.
, vol.14
, Issue.9
, pp. 5135-5146
-
-
Chen, X.1
Lei, L.2
Zhang, H.3
Yuen, C.4
-
32
-
-
85009131916
-
Secure transmission in wireless powered massive MIMO relaying systems: Performance analysis and optimization
-
X. Chen, J. Chen, and T. Liu, "Secure transmission in wireless powered massive MIMO relaying systems: Performance analysis and optimization," IEEE Trans. Veh. Technol., 2015. doi: 10.1109/TVT.2015.2511808.
-
(2015)
IEEE Trans. Veh. Technol.
-
-
Chen, X.1
Chen, J.2
Liu, T.3
-
33
-
-
84923218461
-
Resource allocation for secure multicarrier AF relay system under total power constraint
-
Feb.
-
A. Jindal and R. Bose, "Resource allocation for secure multicarrier AF relay system under total power constraint," IEEE Commun. Lett., vol. 19, no. 2, pp. 231-234, Feb. 2015.
-
(2015)
IEEE Commun. Lett.
, vol.19
, Issue.2
, pp. 231-234
-
-
Jindal, A.1
Bose, R.2
-
34
-
-
80855123713
-
Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks
-
Oct.
-
D. W. K. Ng, E. S. Lo, and R. Schober, "Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks," IEEE Trans. Wireless Commun., vol. 10, no. 10, pp. 3528-3540, Oct. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.10
, pp. 3528-3540
-
-
Ng, D.W.K.1
Lo, E.S.2
Schober, R.3
-
35
-
-
84881585763
-
Cooperative networking towards secure communications for CRNs
-
Apr.
-
N. Zhang, N. Lu, N. Cheng, J. W. Mark, and X. Shen, "Cooperative networking towards secure communications for CRNs," in Proc. IEEE WCNC, Apr. 2013, pp. 1691-1696.
-
(2013)
Proc. IEEE WCNC
, pp. 1691-1696
-
-
Zhang, N.1
Lu, N.2
Cheng, N.3
Mark, J.W.4
Shen, X.5
-
36
-
-
84964827317
-
Optimal power allocation for a massive MIMO relay aided secure communication
-
Dec.
-
J. Chen, X. Chen, and W. Gerstacker, "Optimal power allocation for a massive MIMO relay aided secure communication," in Proc. IEEE GLOBECOM, Dec. 2015, pp. 1-6.
-
(2015)
Proc. IEEE GLOBECOM
, pp. 1-6
-
-
Chen, J.1
Chen, X.2
Gerstacker, W.3
-
37
-
-
84896823919
-
Massive MIMO for next generation wireless systems
-
Feb.
-
E. G. Larsson, O. Edfors, F. Tufvesson, and T. L. Marzetta, "Massive MIMO for next generation wireless systems," IEEE Commun. Mag., vol. 52, no. 2, pp. 186-195, Feb. 2014.
-
(2014)
IEEE Commun. Mag.
, vol.52
, Issue.2
, pp. 186-195
-
-
Larsson, E.G.1
Edfors, O.2
Tufvesson, F.3
Marzetta, T.L.4
-
38
-
-
84883380753
-
On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming
-
Sep.
-
K. H. Park, T. Wang, and M. S. Alouini, "On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1741-1750, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
, pp. 1741-1750
-
-
Park, K.H.1
Wang, T.2
Alouini, M.S.3
-
39
-
-
78449301600
-
Noncooperative cellular wireless with unlimited numbers of base station antennas
-
Nov.
-
T. L. Marzetta, "Noncooperative cellular wireless with unlimited numbers of base station antennas," IEEE Trans. Wireless Commun., vol. 9, no. 11, pp. 3590-3600, Nov. 2010.
-
(2010)
IEEE Trans. Wireless Commun.
, vol.9
, Issue.11
, pp. 3590-3600
-
-
Marzetta, T.L.1
-
40
-
-
73049107143
-
Design and analysis of delay-sensitive cross-layer OFDMA systems with outdated CSIT
-
Jul.
-
D. S. W. Hui and V. K. N. Lau, "Design and analysis of delay-sensitive cross-layer OFDMA systems with outdated CSIT," IEEE Trans. Wireless Commun., vol. 8, no. 7, pp. 3484-3491, Jul. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.7
, pp. 3484-3491
-
-
Hui, D.S.W.1
Lau, V.K.N.2
-
41
-
-
84882770101
-
Secrecy outage capacity of fading channels
-
Sep.
-
O. Gungor, J. Tan, C. E. Koksal, H. El-Gamal, and N. B. Shroff, "Secrecy outage capacity of fading channels," IEEE Trans. Inf. Theory, vol. 59, no. 9, pp. 5379-5397, Sep. 2013.
-
(2013)
IEEE Trans. Inf. Theory
, vol.59
, Issue.9
, pp. 5379-5397
-
-
Gungor, O.1
Tan, J.2
Koksal, C.E.3
El-Gamal, H.4
Shroff, N.B.5
-
42
-
-
84877926659
-
Energy and spectral efficiency of very large multiuser MIMO systems
-
Apr.
-
H. Q. Ngo, E. G. Larsson, and T. L. Marzetta, "Energy and spectral efficiency of very large multiuser MIMO systems," IEEE Trans. Commun., vol. 61, no. 4, pp. 1436-1449, Apr. 2013.
-
(2013)
IEEE Trans. Commun.
, vol.61
, Issue.4
, pp. 1436-1449
-
-
Ngo, H.Q.1
Larsson, E.G.2
Marzetta, T.L.3
|