-
1
-
-
0032164539
-
Cryptographic design vulnerabilities
-
Sep.
-
B. Schneier, "Cryptographic design vulnerabilities," Computer, vol. 31, no. 9, pp. 29-33, Sep. 1998.
-
(1998)
Computer
, vol.31
, Issue.9
, pp. 29-33
-
-
Schneier, B.1
-
2
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Techn. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Techn. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
3
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.3
, pp. 339-348
-
-
Csiszar, I.1
Korner, J.2
-
4
-
-
85032751057
-
Coding for secrecy: An overview of error-control coding techniques for physical-layer security
-
Sep.
-
W. K. Harrison, J. Almeida, M. R. Bloch, S. W. McLaughlin, and J. Barros, "Coding for secrecy: An overview of error-control coding techniques for physical-layer security," IEEE Signal Process. Mag., vol. 30, no. 5, pp. 41-50, Sep. 2013.
-
(2013)
IEEE Signal Process. Mag.
, vol.30
, Issue.5
, pp. 41-50
-
-
Harrison, W.K.1
Almeida, J.2
Bloch, M.R.3
McLaughlin, S.W.4
Barros, J.5
-
5
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct.
-
P. K. Gopala, L. Lai, and H. E. Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
Gamal, H.E.3
-
6
-
-
85032751776
-
Enhancing physical-layer secrecy in multi-antenna wireless systems: An overview of signal processing approaches
-
Sep.
-
Y. W. P. Hong, P. C. Lan, and C. C. J. Kuo, "Enhancing physical-layer secrecy in multi-antenna wireless systems: An overview of signal processing approaches," IEEE Signal Process. Mag., vol. 30, no. 5, pp. 29-40, Sep. 2013.
-
(2013)
IEEE Signal Process. Mag.
, vol.30
, Issue.5
, pp. 29-40
-
-
Hong, Y.W.P.1
Lan, P.C.2
Kuo, C.C.J.3
-
7
-
-
85032751357
-
Cooperative security at the physical layer: A summary of recent advances
-
Sep.
-
R. Bassily et al., "Cooperative security at the physical layer: A summary of recent advances," IEEE Signal Process. Mag., vol. 30, no. 5, pp. 16-28, Sep. 2013.
-
(2013)
IEEE Signal Process. Mag.
, vol.30
, Issue.5
, pp. 16-28
-
-
Bassily, R.1
-
8
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
9
-
-
80052889357
-
Cooperative jamming for secure communications in MIMO relay networks
-
Oct.
-
J. Huang and A. L. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 4871-4884
-
-
Huang, J.1
Swindlehurst, A.L.2
-
10
-
-
84884537599
-
Optimal relay selection for physical-layer security in cooperative wireless networks
-
Oct.
-
Y. Zou, X.Wang, andW. Shen, "Optimal relay selection for physical-layer security in cooperative wireless networks," IEEE J. Sel. Areas Commun., vol. 31, no. 10, pp. 2099-2111, Oct. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.10
, pp. 2099-2111
-
-
Zou, Y.1
Wang, X.2
Shen, W.3
-
11
-
-
84904614329
-
Security versus reliability analysis of opportunistic relaying
-
Jul.
-
Y. Zou, X. Wang, W. Shen, and L. Hanzo, "Security versus reliability analysis of opportunistic relaying," IEEE Trans. Veh. Technol., vol. 63, no. 6, pp. 2653-2661, Jul. 2014.
-
(2014)
IEEE Trans. Veh. Technol.
, vol.63
, Issue.6
, pp. 2653-2661
-
-
Zou, Y.1
Wang, X.2
Shen, W.3
Hanzo, L.4
-
12
-
-
70350583050
-
Relay selection for secure cooperative networks with jamming
-
Oct.
-
I. Krikidis, J. S. Thompson, and S. McLaughlin, "Relay selection for secure cooperative networks with jamming," IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5003-5011, Oct. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.10
, pp. 5003-5011
-
-
Krikidis, I.1
Thompson, J.S.2
McLaughlin, S.3
-
13
-
-
84862963131
-
Joint relay and jammer selection for secure two-way relay networks
-
Feb.
-
J. Chen, R. Zhang, L. Song, Z. Han, and B. Jiao, "Joint relay and jammer selection for secure two-way relay networks," IEEE Trans. Inf. Forensic Security, vol. 7, no. 1, pp. 310-320, Feb. 2012.
-
(2012)
IEEE Trans. Inf. Forensic Security
, vol.7
, Issue.1
, pp. 310-320
-
-
Chen, J.1
Zhang, R.2
Song, L.3
Han, Z.4
Jiao, B.5
-
14
-
-
84863956395
-
Improving wireless security for bidirectional communication scenarios
-
Jul.
-
Z. Ding, M. Xu, J. Lu, and F. Liu, "Improving wireless security for bidirectional communication scenarios," IEEE Trans. Veh. Technol., vol. 61, no. 6, pp. 2842-2848, Jul. 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.6
, pp. 2842-2848
-
-
Ding, Z.1
Xu, M.2
Lu, J.3
Liu, F.4
-
15
-
-
84922896499
-
Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks
-
Feb.
-
C. Wang, H. M. Wang, and X. G. Xia, "Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks," IEEE Trans. Wireless Commun., vol. 14, no. 2, pp. 589-605, Feb. 2015.
-
(2015)
IEEE Trans. Wireless Commun.
, vol.14
, Issue.2
, pp. 589-605
-
-
Wang, C.1
Wang, H.M.2
Xia, X.G.3
-
16
-
-
84920830630
-
Secrecy transmission with a helper: To relay or to jam
-
Feb.
-
H. Deng, H. M.Wang,W. Guo, and W.Wang, "Secrecy transmission with a helper: To relay or to jam," IEEE Trans. Inf. Forensic Security, vol. 10, no. 2, pp. 293-307, Feb. 2015.
-
(2015)
IEEE Trans. Inf. Forensic Security
, vol.10
, Issue.2
, pp. 293-307
-
-
Deng, H.1
Wang, H.M.2
Guo, W.3
Wang, W.4
-
17
-
-
84924410728
-
Wireless physical layer security with imperfect channel state information: A survey
-
Sep.
-
B. He, X. Zhou, and T. D. Abhayapala, "Wireless physical layer security with imperfect channel state information: A survey," ZTE Commun., vol. 11, no. 3, pp. 11-19, Sep. 2013.
-
(2013)
ZTE Commun.
, vol.11
, Issue.3
, pp. 11-19
-
-
He, B.1
Zhou, X.2
Abhayapala, T.D.3
-
18
-
-
79960399745
-
Robust beamforming for security in MIMO wiretap channels with imperfect CSI
-
Jan.
-
A. Mukherjee and A. L. Swindlehurst, "Robust beamforming for security in MIMO wiretap channels with imperfect CSI," IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351-361, Jan. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.1
, pp. 351-361
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
19
-
-
77953707901
-
Relay beamforming strategies for physical-layer security
-
Princeton, NJ, USA, Mar.
-
J. Zhang and M. C. Gursoy, "Relay beamforming strategies for physical-layer security," in Proc. CISS, Princeton, NJ, USA, Mar. 2010, pp. 1-6.
-
(2010)
Proc. CISS
, pp. 1-6
-
-
Zhang, J.1
Gursoy, M.C.2
-
20
-
-
45249104850
-
Wireless information-theoretic security
-
Jun.
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
21
-
-
79952706123
-
Rethinking the secrecy outage formulation: A secure transmission design perspective
-
Mar.
-
X. Zhou, M. R. McKay, B. Maham, and A. Hjorungnes, "Rethinking the secrecy outage formulation: A secure transmission design perspective," IEEE Commun. Lett., vol. 15, no. 3, pp. 302-304, Mar. 2011.
-
(2011)
IEEE Commun. Lett.
, vol.15
, Issue.3
, pp. 302-304
-
-
Zhou, X.1
McKay, M.R.2
Maham, B.3
Hjorungnes, A.4
-
22
-
-
84960403608
-
A new secure transmission scheme with outdated antenna selection
-
Nov.
-
J. Hu, Y. Cai, N. Yang, and W. Yang, "A new secure transmission scheme with outdated antenna selection," IEEE Trans. Inf. Forensics Security, vol. 10, no. 11, pp. 2435-2446, Nov. 2015.
-
(2015)
IEEE Trans. Inf. Forensics Security
, vol.10
, Issue.11
, pp. 2435-2446
-
-
Hu, J.1
Cai, Y.2
Yang, N.3
Yang, W.4
-
23
-
-
84997716328
-
On-off-based secure transmission design with outdated channel state information
-
to be published
-
J. Hu,W. Yang, N. Yang, X. Zhou, and Y. Cai, "On-off-based secure transmission design with outdated channel state information," IEEE Trans. Veh. Technol., to be published.
-
IEEE Trans. Veh. Technol.
-
-
Hu, J.1
Yang, W.2
Yang, N.3
Zhou, X.4
Cai, Y.5
-
24
-
-
84883300441
-
Effect of feedback delay on secure cooperative networks with joint relay and jammer selection
-
Aug.
-
N. E. Wu and H. J. Li, "Effect of feedback delay on secure cooperative networks with joint relay and jammer selection," IEEEWireless Commun. Lett., vol. 2, no. 4, pp. 415-418, Aug. 2013.
-
(2013)
IEEEWireless Commun. Lett.
, vol.2
, Issue.4
, pp. 415-418
-
-
Wu, N.E.1
Li, H.J.2
-
25
-
-
84907206261
-
Secure transmission design and performance analysis for cooperation exploring outdated CSI
-
Sep.
-
X. Guan, Y. Cai, and Y. Yang, "Secure transmission design and performance analysis for cooperation exploring outdated CSI," IEEE Commun. Lett., vol. 18, no. 9, pp. 1637-1640, Sep. 2014.
-
(2014)
IEEE Commun. Lett.
, vol.18
, Issue.9
, pp. 1637-1640
-
-
Guan, X.1
Cai, Y.2
Yang, Y.3
-
26
-
-
84921677489
-
Security performance of multiple antennas multiple relaying networks with outdated relay selection
-
Hefei, China, Oct.
-
L. Wang, S. Xu, W. Yang, W. Yang, and Y. Cai, "Security performance of multiple antennas multiple relaying networks with outdated relay selection," in Proc. WCSP, Hefei, China, Oct. 2014, pp. 1-6.
-
(2014)
Proc. WCSP
, pp. 1-6
-
-
Wang, L.1
Xu, S.2
Yang, W.3
Yang, W.4
Cai, Y.5
-
27
-
-
84921348761
-
Buffer-aided relaying for two-hop secure communication
-
Jan.
-
J. Huang and A. L. Swindlehurst, "Buffer-aided relaying for two-hop secure communication," IEEE Trans. Wireless Commun., vol. 14, no. 1, pp. 152-164, Jan. 2015.
-
(2015)
IEEE Trans. Wireless Commun.
, vol.14
, Issue.1
, pp. 152-164
-
-
Huang, J.1
Swindlehurst, A.L.2
-
28
-
-
84937146871
-
Secure transmission for multiuser relay networks
-
Jul.
-
S. I. Kim, I. M. Kim, and J. Heo, "Secure transmission for multiuser relay networks," IEEE Trans. Wireless Commun., vol. 14, no. 7, pp. 3724-3737, Jul. 2015.
-
(2015)
IEEE Trans. Wireless Commun.
, vol.14
, Issue.7
, pp. 3724-3737
-
-
Kim, S.I.1
Kim, I.M.2
Heo, J.3
-
29
-
-
62949208925
-
Error performance of transmit beamforming with delayed and limited feedback
-
Mar.
-
Y. Ma, D. Zhang, A. Leith, and Z. Wang, "Error performance of transmit beamforming with delayed and limited feedback," IEEE Trans. Wireless Commun., vol. 8, no. 3, pp. 1164-1170, Mar. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.3
, pp. 1164-1170
-
-
Ma, Y.1
Zhang, D.2
Leith, A.3
Wang, Z.4
-
30
-
-
84903275279
-
Ergodic secret message capacity of the wirechannel with finite-rate feedback
-
Jun.
-
Z. Rezki, A. Khisti, and M. S. Alouini, "Ergodic secret message capacity of the wirechannel with finite-rate feedback," IEEE Trans. Wireless Commun., vol. 13, no. 6, pp. 3364-3379, Jun. 2014.
-
(2014)
IEEE Trans. Wireless Commun.
, vol.13
, Issue.6
, pp. 3364-3379
-
-
Rezki, Z.1
Khisti, A.2
Alouini, M.S.3
-
31
-
-
64249156371
-
On the throughput of secure hybrid-ARQ protocols for Gaussian block-fading channels
-
Apr.
-
X. Tang, R. Liu, P. Spasojevic, and H. V. Poor, "On the throughput of secure hybrid-ARQ protocols for Gaussian block-fading channels," IEEE Trans. Inf. Theory, vol. 55, no. 4, pp. 1575-1591, Apr. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.4
, pp. 1575-1591
-
-
Tang, X.1
Liu, R.2
Spasojevic, P.3
Poor, H.V.4
-
32
-
-
77957893936
-
Performance analysis of partial relay selection with feedback delay
-
Jun.
-
H. A. Suraweera, M. Soysa, C. Tellambura, and H. K. Garg, "Performance analysis of partial relay selection with feedback delay," IEEE Signal Process. Lett., vol. 17, no. 6, pp. 531-534, Jun. 2010.
-
(2010)
IEEE Signal Process. Lett.
, vol.17
, Issue.6
, pp. 531-534
-
-
Suraweera, H.A.1
Soysa, M.2
Tellambura, C.3
Garg, H.K.4
-
33
-
-
0003498504
-
-
6th ed. San Diego, CA, USA: Academic
-
I. S. Gradshteyn and I.M. Ryzhik, Table of Integrals, Series and Products, 6th ed. San Diego, CA, USA: Academic, 2000.
-
(2000)
Table of Integrals, Series and Products
-
-
Gradshteyn, I.S.1
Ryzhik, I.M.2
-
34
-
-
80051983390
-
Outage probability of interference-limited amplifyand-forward relaying with partial relay selection
-
Yokohama, Japan, May
-
S. Kim and J. Heo. "Outage probability of interference-limited amplifyand-forward relaying with partial relay selection," in Proc. IEEE VTC, Yokohama, Japan, May 2011, pp. 1-5.
-
(2011)
Proc. IEEE VTC
, pp. 1-5
-
-
Kim, S.1
Heo, J.2
|