-
1
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
2
-
-
0017996501
-
The Gaussian wire-tap channel
-
Jul.
-
S. Leung-Yan-Cheong and M. E. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, Jul. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.1
Hellman, M.E.2
-
3
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
Sep.
-
L. Lai and H. El Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.9
, pp. 4005-4019
-
-
Lai, L.1
El Gamal, H.2
-
4
-
-
84970963219
-
Optimal power allocation schemes for the single AF relay and jammer wiretap channels
-
May
-
L. J. Rodríguez, N. H. Tran, and T. Le-Ngoc, "Optimal power allocation schemes for the single AF relay and jammer wiretap channels," IEEE Trans. Veh. Technol., vol. 65, no. 5, pp. 3042-3056, May 2016.
-
(2016)
IEEE Trans. Veh. Technol.
, vol.65
, Issue.5
, pp. 3042-3056
-
-
Rodríguez, L.J.1
Tran, N.H.2
Le-Ngoc, T.3
-
5
-
-
84920830630
-
Secrecy transmission with a helper: To relay or to jam
-
Feb.
-
H. Deng, H. M. Wang, W. Guo, and W. Wang, "Secrecy transmission with a helper: To relay or to jam," IEEE Trans. Inf. Forensics Security, vol. 10, no. 2, pp. 293-307, Feb. 2015.
-
(2015)
IEEE Trans. Inf. Forensics Security
, vol.10
, Issue.2
, pp. 293-307
-
-
Deng, H.1
Wang, H.M.2
Guo, W.3
Wang, W.4
-
6
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
7
-
-
84883785476
-
Improving physical layer secrecy using full-duplex jamming receivers
-
Oct.
-
G. Zheng, I. Krikidis, J. Li, A. P. Petropulu, and B. Ottersten, "Improving physical layer secrecy using full-duplex jamming receivers," IEEE Trans. Signal Process., vol. 61, no. 20, pp. 4962-4974, Oct. 2013.
-
(2013)
IEEE Trans. Signal Process
, vol.61
, Issue.20
, pp. 4962-4974
-
-
Zheng, G.1
Krikidis, I.2
Li, J.3
Petropulu, A.P.4
Ottersten, B.5
-
8
-
-
79951618084
-
Optimal cooperative jamming to enhance physical layer security using relays
-
Mar.
-
G. Zheng, L.-C. Choo, and K.-K. Wong, "Optimal cooperative jamming to enhance physical layer security using relays," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317-1322, Mar. 2011.
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.3
, pp. 1317-1322
-
-
Zheng, G.1
Choo, L.-C.2
Wong, K.-K.3
-
9
-
-
84888318377
-
Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks
-
Dec.
-
H.-M. Wang, M. Luo, Q. Yin, and X.-G. Xia, "Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks," IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 2007-2020, Dec. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.12
, pp. 2007-2020
-
-
Wang, H.-M.1
Luo, M.2
Yin, Q.3
Xia, X.-G.4
-
10
-
-
84922896499
-
Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks
-
Feb.
-
C. Wang, H.-M. Wang, and X.-G. Xia, "Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks," IEEE Trans. Wireless Commun., vol. 14, no. 2, pp. 589-605, Feb. 2015.
-
(2015)
IEEE Trans. Wireless Commun.
, vol.14
, Issue.2
, pp. 589-605
-
-
Wang, C.1
Wang, H.-M.2
Xia, X.-G.3
-
11
-
-
84962607770
-
Generalized relay selection for improved security in cooperative DF relay networks
-
Feb.
-
W. Wang, K. C. Teh, and K. H. Li, "Generalized relay selection for improved security in cooperative DF relay networks," IEEE Wireless Commun. Lett., vol. 5, no. 1, pp. 28-31, Feb. 2016.
-
(2016)
IEEE Wireless Commun. Lett.
, vol.5
, Issue.1
, pp. 28-31
-
-
Wang, W.1
Teh, K.C.2
Li, K.H.3
-
12
-
-
84922811042
-
Physical layer network security in the full-duplex relay system
-
Mar.
-
G. Chen, Y. Gong, P. Xiao, and J. A. Chambers, "Physical layer network security in the full-duplex relay system," IEEE Trans. Inf. Forensics Security, vol. 10, no. 3, pp. 574-583, Mar. 2015.
-
(2015)
IEEE Trans. Inf. Forensics Security
, vol.10
, Issue.3
, pp. 574-583
-
-
Chen, G.1
Gong, Y.2
Xiao, P.3
Chambers, J.A.4
-
13
-
-
84939229063
-
Improving wireless secrecy rate via full-duplex relay-assisted protocols
-
Oct.
-
S. Parsaeefard and T. Le-Ngoc, "Improving wireless secrecy rate via full-duplex relay-assisted protocols," IEEE Trans. Inf. Forensics Security, vol. 10, no. 10, pp. 2095-2107, Oct. 2015.
-
(2015)
IEEE Trans. Inf. Forensics Security
, vol.10
, Issue.10
, pp. 2095-2107
-
-
Parsaeefard, S.1
Le-Ngoc, T.2
-
14
-
-
77954584734
-
Cooperation with an untrusted relay: A secrecy perspective
-
Aug.
-
X. He and A. Yener, "Cooperation with an untrusted relay: A secrecy perspective," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3807-3827, Aug. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.8
, pp. 3807-3827
-
-
He, X.1
Yener, A.2
-
15
-
-
84867800602
-
Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes
-
Oct.
-
L. Sun, T. Zhang, Y. Li, and H. Niu, "Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes," IEEE Trans. Veh. Technol., vol. 61, no. 8, pp. 3801-3807, Oct. 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.8
, pp. 3801-3807
-
-
Sun, L.1
Zhang, T.2
Li, Y.3
Niu, H.4
-
16
-
-
84937132656
-
Capacity scaling and diversity order for secure cooperative relaying with untrustworthy relays
-
Jul.
-
J.-B. Kim, J. Lim, and J. M. Cioffi, "Capacity scaling and diversity order for secure cooperative relaying with untrustworthy relays," IEEE Trans. Wireless Commun., vol. 14, no. 7, pp. 3866-3876, Jul. 2015.
-
(2015)
IEEE Trans. Wireless Commun.
, vol.14
, Issue.7
, pp. 3866-3876
-
-
Kim, J.-B.1
Lim, J.2
Cioffi, J.M.3
-
17
-
-
84933057122
-
Opportunistic transmission of nonregenerative network with untrusted relay
-
Jun.
-
M. Ju, D.-H. Kim, and K.-S. Hwang, "Opportunistic transmission of nonregenerative network with untrusted relay," IEEE Trans. Veh. Technol., vol. 64, no. 6, pp. 2703-2709, Jun. 2015.
-
(2015)
IEEE Trans. Veh. Technol.
, vol.64
, Issue.6
, pp. 2703-2709
-
-
Ju, M.1
Kim, D.-H.2
Hwang, K.-S.3
-
18
-
-
84555190397
-
Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system
-
Jan.
-
C. Jeong, I.-M. Kim, and D. Kim, "Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system," IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310-325, Jan. 2012.
-
(2012)
IEEE Trans. Signal Process
, vol.60
, Issue.1
, pp. 310-325
-
-
Jeong, C.1
Kim, I.-M.2
Kim, D.3
-
19
-
-
84898039745
-
Secure beamforming for MIMO two-way communications with an untrusted relay
-
May
-
J. Mo, M. Tao, Y. Liu, and R. Wang, "Secure beamforming for MIMO two-way communications with an untrusted relay," IEEE Trans. Signal Process., vol. 62, no. 9, pp. 2185-2199, May 2014.
-
(2014)
IEEE Trans. Signal Process
, vol.62
, Issue.9
, pp. 2185-2199
-
-
Mo, J.1
Tao, M.2
Liu, Y.3
Wang, R.4
-
20
-
-
84877718412
-
Secure communication via an untrusted non-regenerative relay in fading channels
-
May
-
J. Huang, A. Mukherjee, and A. L. Swindlehurst, "Secure communication via an untrusted non-regenerative relay in fading channels," IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2536-2550, May 2013.
-
(2013)
IEEE Trans. Signal Process
, vol.61
, Issue.10
, pp. 2536-2550
-
-
Huang, J.1
Mukherjee, A.2
Swindlehurst, A.L.3
-
21
-
-
84891348392
-
Cross-layer security in two-hop wireless Gaussian relay network with untrusted relays
-
Jun.
-
M. Kaliszan, J. Mohammadi, and S. Stánczak, "Cross-layer security in two-hop wireless Gaussian relay network with untrusted relays," in Proc. IEEE Int. Conf. Commun. (ICC), Jun. 2013, pp. 2199-2204.
-
(2013)
Proc. IEEE Int. Conf. Commun. (ICC)
, pp. 2199-2204
-
-
Kaliszan, M.1
Mohammadi, J.2
Stánczak, S.3
-
23
-
-
33847736358
-
Spectral efficient protocols for halfduplex fading relay channels
-
Feb.
-
B. Rankov and A. Wittneben, "Spectral efficient protocols for halfduplex fading relay channels," IEEE J. Sel. Areas Commun., vol. 25, no. 2, pp. 379-389, Feb. 2007.
-
(2007)
IEEE J. Sel. Areas Commun.
, vol.25
, Issue.2
, pp. 379-389
-
-
Rankov, B.1
Wittneben, A.2
-
24
-
-
37049000338
-
Recovering multiplexing loss through successive relaying using repetition coding
-
Dec.
-
Y. Fan, C. Wang, J. Thompson, and H. V. Poor, "Recovering multiplexing loss through successive relaying using repetition coding," IEEE Trans. Wireless Commun., vol. 6, no. 12, pp. 4484-4493, Dec. 2007.
-
(2007)
IEEE Trans. Wireless Commun.
, vol.6
, Issue.12
, pp. 4484-4493
-
-
Fan, Y.1
Wang, C.2
Thompson, J.3
Poor, H.V.4
-
25
-
-
70350308037
-
AF two-path half duplex relaying with inter-relay self interference cancellation: Diversity analysis and its improvement
-
Sep.
-
H. Wicaksana, S. H. Ting, C. K. Ho, W. H. Chin, and Y. L. Guan, "AF two-path half duplex relaying with inter-relay self interference cancellation: Diversity analysis and its improvement," IEEE Trans. Wireless Commun., vol. 8, no. 9, pp. 4720-4729, Sep. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.9
, pp. 4720-4729
-
-
Wicaksana, H.1
Ting, S.H.2
Ho, C.K.3
Chin, W.H.4
Guan, Y.L.5
-
26
-
-
84898688663
-
Partial inter-relay interference cancellation in two path successive relay network
-
Mar.
-
Y. Ji, C. Han, A. Wang, and H. Shi, "Partial inter-relay interference cancellation in two path successive relay network," IEEE Commun. Lett., vol. 18, no. 3, pp. 451-454, Mar. 2014.
-
(2014)
IEEE Commun. Lett.
, vol.18
, Issue.3
, pp. 451-454
-
-
Ji, Y.1
Han, C.2
Wang, A.3
Shi, H.4
-
27
-
-
84959476604
-
Rate maximization based power allocation and relay selection with IRI consideration for two-path AF relaying
-
Nov.
-
S. H. Kim, T. V. K. Chaitanya, T. Le-Ngoc, and J. Kim, "Rate maximization based power allocation and relay selection with IRI consideration for two-path AF relaying," IEEE Trans. Wireless Commun., vol. 14, no. 11, pp. 6012-6027, Nov. 2015.
-
(2015)
IEEE Trans. Wireless Commun.
, vol.14
, Issue.11
, pp. 6012-6027
-
-
Kim, S.H.1
Chaitanya, T.V.K.2
Le-Ngoc, T.3
Kim, J.4
-
28
-
-
84930504733
-
A buffer-aided successive opportunistic relay selection scheme with power adaptation and inter-relay interference cancellation for cooperative diversity systems
-
May
-
N. Nomikos, T. Charalambous, I. Krikidis, D. N. Skoutas, D. Vouyioukas, and M. Johansson, "A buffer-aided successive opportunistic relay selection scheme with power adaptation and inter-relay interference cancellation for cooperative diversity systems," IEEE Trans. Commun., vol. 63, no. 5, pp. 1623-1634, May 2015.
-
(2015)
IEEE Trans. Commun.
, vol.63
, Issue.5
, pp. 1623-1634
-
-
Nomikos, N.1
Charalambous, T.2
Krikidis, I.3
Skoutas, D.N.4
Vouyioukas, D.5
Johansson, M.6
-
29
-
-
84862819659
-
An efficient successive relaying protocol for multiple-relay cooperative networks
-
May
-
Y. Hu, K. H. Li, and K. C. Teh, "An efficient successive relaying protocol for multiple-relay cooperative networks," IEEE Trans. Wireless Commun., vol. 11, no. 5, pp. 1892-1899, May 2012.
-
(2012)
IEEE Trans. Wireless Commun.
, vol.11
, Issue.5
, pp. 1892-1899
-
-
Hu, Y.1
Li, K.H.2
Teh, K.C.3
-
30
-
-
84907533750
-
On the secrecy throughput maximization for MISO cognitive radio network in slow fading channels
-
Nov.
-
C. Wang and H.-M. Wang, "On the secrecy throughput maximization for MISO cognitive radio network in slow fading channels," IEEE Trans. Inf. Forensics Security, vol. 9, no. 11, pp. 1814-1827, Nov. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.11
, pp. 1814-1827
-
-
Wang, C.1
Wang, H.-M.2
-
31
-
-
33644986718
-
A simple cooperative diversity method based on network path selection
-
Mar.
-
A. Bletsas, A. Khisti, D. P. Reed, and A. Lippman, "A simple cooperative diversity method based on network path selection," IEEE J. Sel. Areas Commun., vol. 24, no. 3, pp. 659-672, Mar. 2006.
-
(2006)
IEEE J. Sel. Areas Commun.
, vol.24
, Issue.3
, pp. 659-672
-
-
Bletsas, A.1
Khisti, A.2
Reed, D.P.3
Lippman, A.4
-
32
-
-
84871761876
-
Full-duplex relay selection for amplify-and-forward cooperative networks
-
Dec.
-
I. Krikidis, H. A. Suraweera, P. J. Smith, and C. Yuen, "Full-duplex relay selection for amplify-and-forward cooperative networks," IEEE Trans. Wireless Commun., vol. 11, no. 12, pp. 4381-4393, Dec. 2012.
-
(2012)
IEEE Trans. Wireless Commun.
, vol.11
, Issue.12
, pp. 4381-4393
-
-
Krikidis, I.1
Suraweera, H.A.2
Smith, P.J.3
Yuen, C.4
-
33
-
-
84911108098
-
-
New York, NY, USA: Academic
-
A. Jeffrey and D. Zwillinger, Table of Integrals, Series, and Products. New York, NY, USA: Academic, 2007.
-
(2007)
Table of Integrals, Series, and Products
-
-
Jeffrey, A.1
Zwillinger, D.2
-
34
-
-
84924515029
-
-
Cambridge, U.K.: Cambridge Univ. Press
-
H.-C. Yang and M.-S. Alouini, Order Statistics in Wireless Communications: Diversity, Adaptation, and Scheduling in MIMO and OFDM Systems. Cambridge, U.K.: Cambridge Univ. Press, 2011.
-
(2011)
Order Statistics in Wireless Communications: Diversity, Adaptation, and Scheduling in MIMO and OFDM Systems
-
-
Yang, H.-C.1
Alouini, M.-S.2
|