-
1
-
-
45249104850
-
Wireless information-Theoretic security
-
Jun
-
M. Bloch, J. Barros, M. Rodrigues, and S. McLaughlin, "Wireless information-Theoretic security, " IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.3
McLaughlin, S.4
-
2
-
-
68349116049
-
Information theoretic security
-
Y. Liang, H. Poor, and S. Shamai, "Information theoretic security, " Foundations Trends Commun. Inf. Theory, vol. 5, no. 4/5, pp. 355-580, 2009.
-
(2009)
Foundations Trends Commun. Inf. Theory
, vol.5
, Issue.4-5
, pp. 355-580
-
-
Liang, Y.1
Poor, H.2
Shamai, S.3
-
4
-
-
79955372872
-
Physical layer security in wireless networks: A tutorial
-
Apr
-
Y.-S. Shiu, S. Y. Chang, H.-C. Wu, S.-H. Huang, and H.-H. Chen, "Physical layer security in wireless networks: A tutorial, " IEEE Wireless Commun. Mag., vol. 18, no. 2, pp. 66-74, Apr. 2011.
-
(2011)
IEEE Wireless Commun. Mag
, vol.18
, Issue.2
, pp. 66-74
-
-
Shiu, Y.-S.1
Chang, S.Y.2
Wu, H.-C.3
Huang, S.-H.4
Chen, H.-H.5
-
5
-
-
0016562514
-
The wire-Tap channel
-
Oct
-
A. Wyner, "The wire-Tap channel, " Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.1
-
6
-
-
45249101530
-
The general Gaussian multiple-Access and twoway wiretap channels: Achievable rates and cooperative jamming
-
Jun
-
E. Tekin and A. Yener, "The general Gaussian multiple-Access and twoway wiretap channels: Achievable rates and cooperative jamming, " IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
7
-
-
70350583050
-
Relay selection for secure cooperative networks with jamming
-
Oct
-
I. Krikidis, J. Thompson, and S. Mclaughlin, "Relay selection for secure cooperative networks with jamming, " IEEE Trans. Commun., vol. 8, no. 10, pp. 5003-5011, Oct. 2009.
-
(2009)
IEEE Trans. Commun
, vol.8
, Issue.10
, pp. 5003-5011
-
-
Krikidis, I.1
Thompson, J.2
McLaughlin, S.3
-
8
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar
-
L. Dong, Z. Han, A. Petropulu, and H. Poor, "Improving wireless physical layer security via cooperating relays, " IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.3
Poor, H.4
-
9
-
-
80052870842
-
On cooperative relaying schemes for wireless physical layer security
-
Oct
-
J. Li, A. Petropulu, and S. Weber, "On cooperative relaying schemes for wireless physical layer security, " IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4985-4997, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.10
, pp. 4985-4997
-
-
Li, J.1
Petropulu, A.2
Weber, S.3
-
10
-
-
79951618084
-
Optimal cooperative jamming to enhance physical layer security using relays
-
Mar
-
G. Zheng, L.-C. Choo, and K.-K. Wong, "Optimal cooperative jamming to enhance physical layer security using relays, " IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317-1322, Mar. 2011.
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.3
, pp. 1317-1322
-
-
Zheng, G.1
Choo, L.-C.2
Wong, K.-K.3
-
11
-
-
84862963131
-
Joint relay and jammer selection for secure two-way relay networks
-
Feb
-
J. Chen, R. Zhang, L. Song, Z. Han, and B. Jiao, "Joint relay and jammer selection for secure two-way relay networks, " IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 310-320, Feb. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.1
, pp. 310-320
-
-
Chen, J.1
Zhang, R.2
Song, L.3
Han, Z.4
Jiao, B.5
-
12
-
-
79955491895
-
Interference assisted secret communication
-
May
-
X. Tang, R. Liu, P. Spasojevic, and H. Poor, "Interference assisted secret communication, " IEEE Trans. Inf. Theory, vol. 57, no. 5, pp. 3153-3167, May 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.5
, pp. 3153-3167
-
-
Tang, X.1
Liu, R.2
Spasojevic, P.3
Poor, H.4
-
13
-
-
84856271363
-
On the application of cooperative transmission to secrecy communications
-
Feb
-
Z. Ding, K. Leung, D. Goeckel, and D. Towsley, "On the application of cooperative transmission to secrecy communications, " IEEE J. Sel. Areas Commun., vol. 30, no. 2, pp. 359-368, Feb. 2012.
-
(2012)
IEEE J. Sel. Areas Commun
, vol.30
, Issue.2
, pp. 359-368
-
-
Ding, Z.1
Leung, K.2
Goeckel, D.3
Towsley, D.4
-
14
-
-
84862635573
-
Distributed beamforming for physical-layer security of two-way relay networks
-
Jul
-
H.-M. Wang, Q. Yin, and X.-G. Xia, "Distributed beamforming for physical-layer security of two-way relay networks, " IEEE Trans. Signal Process., vol. 60, no. 7, pp. 3532-3545, Jul. 2012.
-
(2012)
IEEE Trans. Signal Process
, vol.60
, Issue.7
, pp. 3532-3545
-
-
Wang, H.-M.1
Yin, Q.2
Xia, X.-G.3
-
15
-
-
84957100456
-
Joint cooperative beamforming, jamming and power allocation to secure AF relay systems
-
H. Wang, F. Liu, and M. Yang, "Joint cooperative beamforming, jamming and power allocation to secure AF relay systems, " IEEE Trans. Veh. Technol., DOI: 10.1109/TVT.2014.2370754.
-
IEEE Trans. Veh. Technol
-
-
Wang, H.1
Liu, F.2
Yang, M.3
-
16
-
-
80052157752
-
Cooperative jamming and power allocation for wireless relay networks in presence of eavesdropper
-
Jun
-
L. Dong, H. Yousefizadeh, and H. Jafarkhani, "Cooperative jamming and power allocation for wireless relay networks in presence of eavesdropper, " in Proc. IEEE Int. Conf. Commun., Jun. 2011, pp. 1-5.
-
(2011)
Proc IEEE Int. Conf. Commun
, pp. 1-5
-
-
Dong, L.1
Yousefizadeh, H.2
Jafarkhani, H.3
-
17
-
-
84891350212
-
Cooperative jamming protocols in two hop amplify-And-forward wiretap channels
-
Jun
-
D. Fang, N. Yang, M. Elkashlan, P. L. Yeoh, and J. Yuan, "Cooperative jamming protocols in two hop amplify-And-forward wiretap channels, " in Proc. IEEE Int. Conf. Commun., Jun. 2013, pp. 2188-2192.
-
(2013)
Proc IEEE Int. Conf. Commun
, pp. 2188-2192
-
-
Fang, D.1
Yang, N.2
Elkashlan, M.3
Yeoh, P.L.4
Yuan, J.5
-
18
-
-
84883380753
-
On the jamming power allocation for secure amplify-And-forward relaying via cooperative jamming
-
Sep
-
K.-H. Park, T. Wang, and M.-S. Alouini, "On the jamming power allocation for secure amplify-And-forward relaying via cooperative jamming, " IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1741-1750, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun
, vol.31
, Issue.9
, pp. 1741-1750
-
-
Park, K.-H.1
Wang, T.2
Alouini, M.-S.3
-
19
-
-
70349175144
-
Analyzing amplifyand-forward and decode-And-forward cooperative strategies in Wyners channel model
-
Apr
-
P. Zhang, J. Yuan, J. Chen, J. Wang, and J. Yang, "Analyzing amplifyand-forward and decode-And-forward cooperative strategies in Wyners channel model, " in Proc. IEEEWireless Commun. Netw. Conf., Apr. 2009, pp. 1-5.
-
(2009)
Proc. IEEEWireless Commun. Netw. Conf
, pp. 1-5
-
-
Zhang, P.1
Yuan, J.2
Chen, J.3
Wang, J.4
Yang, J.5
-
20
-
-
0032386231
-
Descartes rule of signs revisited
-
May
-
B. Anderson, J. Jackson, and M. Sitharam, "Descartes rule of signs revisited, " Amer. Math. Monthly, vol. 105, no. 5, pp. 447-451, May 1998.
-
(1998)
Amer. Math. Monthly
, vol.105
, Issue.5
, pp. 447-451
-
-
Anderson, B.1
Jackson, J.2
Sitharam, M.3
-
21
-
-
80054058314
-
Optimal power allocation for secure multicarrier relay systems
-
Nov
-
C. Jeong and I.-M. Kim, "Optimal power allocation for secure multicarrier relay systems, " IEEE Trans. Signal Process., vol. 59, no. 11, pp. 5428-5442, Nov. 2011.
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.11
, pp. 5428-5442
-
-
Jeong, C.1
Kim, I.-M.2
-
22
-
-
84904282993
-
Joint source-relay precoding and power allocation for secure amplify-And-forward MIMO relay networks
-
Aug
-
H.-M. Wang, F. Liu, and X.-G. Xia, "Joint source-relay precoding and power allocation for secure amplify-And-forward MIMO relay networks, " IEEE Trans. Inf. Forensics Security, vol. 9, no. 8, pp. 1240-1250, Aug. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.8
, pp. 1240-1250
-
-
Wang, H.-M.1
Liu, F.2
Xia, X.-G.3
-
23
-
-
84923218461
-
Resource allocation for secure multicarrier AF relay system under total power constraint
-
Feb
-
A. Jindal and R. Bose, "Resource allocation for secure multicarrier AF relay system under total power constraint, " IEEE Commun. Lett., vol. 19, no. 2, pp. 231-234, Feb. 2015.
-
(2015)
IEEE Commun. Lett
, vol.19
, Issue.2
, pp. 231-234
-
-
Jindal, A.1
Bose, R.2
-
24
-
-
77957761407
-
Cooperative secret communication with artificial noise in symmetric interference channel
-
Oct
-
J. Zhu, J. Mo, and M. Tao, "Cooperative secret communication with artificial noise in symmetric interference channel, " IEEE Commun. Lett., vol. 14, no. 10, pp. 885-887, Oct. 2010.
-
(2010)
IEEE Commun. Lett
, vol.14
, Issue.10
, pp. 885-887
-
-
Zhu, J.1
Mo, J.2
Tao, M.3
-
25
-
-
4344559690
-
Fading relay channel: Performance limits and space-Time signal design
-
Aug
-
R. U. Nabar, H. Bölcskei, and F. W. Kneuböhler, "Fading relay channel: Performance limits and space-Time signal design, " IEEE J. Sel. Areas Commun., vol. 22, no. 6, pp. 1099-1109, Aug. 2004.
-
(2004)
IEEE J. Sel. Areas Commun
, vol.22
, Issue.6
, pp. 1099-1109
-
-
Nabar, R.U.1
Bölcskei, H.2
Kneuböhler, F.W.3
-
26
-
-
84908067343
-
-
Oct
-
A. Akhtar, A. Behnad, and X. Wang, "On the secrecy rate achievability in dual-hop amplify-And-forward relay networks, " vol. 3, no. 5, pp. 493-496, Oct. 2014.
-
(2014)
On the Secrecy Rate Achievability in Dual-hop Amplify-And-forward Relay Networks
, vol.3
, Issue.5
, pp. 493-496
-
-
Akhtar, A.1
Behnad, A.2
Wang, X.3
-
27
-
-
11844274674
-
A performance study of dual-hop transmissions with fixed gain relays
-
Nov
-
M. Hasna and M.-S. Alouini, "A performance study of dual-hop transmissions with fixed gain relays, " IEEE Trans. Wireless Commun., vol. 3, no. 6, pp. 1963-1968, Nov. 2004.
-
(2004)
IEEE Trans. Wireless Commun
, vol.3
, Issue.6
, pp. 1963-1968
-
-
Hasna, M.1
Alouini, M.-S.2
-
29
-
-
15544372851
-
Adaptive optimal transmit power allocation for twohop non-regenerative wireless relaying system
-
May
-
Z. Jingmei et al., "Adaptive optimal transmit power allocation for twohop non-regenerative wireless relaying system, " Proc. IEEE 59th VTC-Spring, May 2004, vol. 2, pp. 1213-1217.
-
(2004)
Proc IEEE 59th VTC-Spring
, vol.2
, pp. 1213-1217
-
-
Jingmei, Z.1
|