-
1
-
-
0016562514
-
The wire-tap channel
-
Oct
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1367, Oct. 1975.
-
(1975)
Bell Syst. Tech. J
, vol.54
, Issue.8
, pp. 1355-1367
-
-
Wyner, A.D.1
-
2
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
3
-
-
0017996501
-
The Gaussian wiretap channel
-
Jul
-
S. K. Leung-Yan-Cheong and M. E. Hellman, "The Gaussian wiretap channel," IEEE Trans. Inf. Theory, vol. IT-24, no. 4, pp. 451-456, Jul. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.K.1
Hellman, M.E.2
-
4
-
-
77953802876
-
Secure transmission with multiple antennas - Part I: The MISOME wiretap channel
-
Jul
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas - Part I: The MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, Jul. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.7
, pp. 3088-3104
-
-
Khisti, A.1
Wornell, G.W.2
-
5
-
-
77958560746
-
Secure transmission with multiple antennas - Part II: The MIMOME wiretap channel
-
Nov
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas - Part II: The MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.11
, pp. 5515-5532
-
-
Khisti, A.1
Wornell, G.W.2
-
6
-
-
79960996804
-
The secrecy capacity of the MIMO wiretap channel
-
Aug
-
F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4961-4972, Aug. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.8
, pp. 4961-4972
-
-
Oggier, F.1
Hassibi, B.2
-
7
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
Jun
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
-
(2008)
IEEE Trans. Wireless Commun
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
8
-
-
77958083375
-
Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation
-
Oct
-
X. Zhou and M. R. McKay, "Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation," IEEE Trans. Veh. Technol., vol. 59, no. 8, pp. 3831-3842, Oct. 2010.
-
(2010)
IEEE Trans. Veh. Technol
, vol.59
, Issue.8
, pp. 3831-3842
-
-
Zhou, X.1
McKay, M.R.2
-
9
-
-
79951595646
-
QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificialnoise- aided approach
-
Mar
-
W.-C. Liao, T.-H. Chang, W.-K. Ma, and C.-Y. Chi, "QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificialnoise- aided approach," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1202-1216, Mar. 2011.
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.3
, pp. 1202-1216
-
-
Liao, W.-C.1
Chang, T.-H.2
Ma, W.-K.3
Chi, C.-Y.4
-
10
-
-
79955484022
-
On secrecy of codebook-based transmission beamforming under receiver limited feedback
-
Apr
-
S. Bashar, Z. Ding, and Y. G. Li, "On secrecy of codebook-based transmission beamforming under receiver limited feedback," IEEE Trans. Wireless Commun., vol. 10, no. 4, pp. 1212-1223, Apr. 2011.
-
(2011)
IEEE Trans. Wireless Commun
, vol.10
, Issue.4
, pp. 1212-1223
-
-
Bashar, S.1
Ding, Z.2
Li, Y.G.3
-
11
-
-
84873731253
-
Transmit antenna selection for security enhancement in MIMO wiretap channels
-
Jan
-
N. Yang, P. L. Yeoh, M. Elkashlan, R. Schober, and I. B. Collings, "Transmit antenna selection for security enhancement in MIMO wiretap channels," IEEE Trans. Commun., vol. 61, no. 1, pp. 144-154, Jan. 2013.
-
(2013)
IEEE Trans. Commun
, vol.61
, Issue.1
, pp. 144-154
-
-
Yang, N.1
Yeoh, P.L.2
Elkashlan, M.3
Schober, R.4
Collings, I.B.5
-
12
-
-
84884816590
-
MIMO wiretap channels: Secure transmission using transmit antenna selection and receive generalized selection combining
-
Sep
-
N. Yang, P. L. Yeoh, M. Elkashlan, R. Schober, and J. Yuan, "MIMO wiretap channels: Secure transmission using transmit antenna selection and receive generalized selection combining," IEEE Commun. Lett., vol. 17, no. 9, pp. 1754-1757, Sep. 2013.
-
(2013)
IEEE Commun. Lett
, vol.17
, Issue.9
, pp. 1754-1757
-
-
Yang, N.1
Yeoh, P.L.2
Elkashlan, M.3
Schober, R.4
Yuan, J.5
-
13
-
-
84856271363
-
On the application of cooperative transmission to secrecy communication
-
Feb
-
Z. Ding, K. Leung, D. L. Goeckel, and D. Towsley, "On the application of cooperative transmission to secrecy communication," IEEE J. Sel. Areas Commun., vol. 30, no. 2, pp. 359-368, Feb. 2012.
-
(2012)
IEEE J. Sel. Areas Commun
, vol.30
, Issue.2
, pp. 359-368
-
-
Ding, Z.1
Leung, K.2
Goeckel, D.L.3
Towsley, D.4
-
14
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
15
-
-
80052870842
-
On cooperative relaying schemes for wireless physical layer security
-
Oct
-
J. Y. Li, A. P. Petropulu, and S. Weber, "On cooperative relaying schemes for wireless physical layer security," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4985-4997, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.10
, pp. 4985-4997
-
-
Li, J.Y.1
Petropulu, A.P.2
Weber, S.3
-
16
-
-
79951618084
-
Optimal cooperative jamming to enhance physical layer security using relays
-
Mar
-
G. Zheng, L. C. Choo, and K. K. Wong, "Optimal cooperative jamming to enhance physical layer security using relays," IEEE Trans. Signal Process., vol. 59, no. 13, pp. 1317-1322, Mar. 2011.
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.13
, pp. 1317-1322
-
-
Zheng, G.1
Choo, L.C.2
Wong, K.K.3
-
17
-
-
77955366092
-
Collaborative relay beamforming for secrecy
-
May
-
J. Zhang and M. C. Gursoy, "Collaborative relay beamforming for secrecy," in Proc. IEEE ICC, May 2010, pp. 1-5.
-
(2010)
Proc. IEEE ICC
, pp. 1-5
-
-
Zhang, J.1
Gursoy, M.C.2
-
18
-
-
84870554789
-
Cooperative secure beamforming for AF relay networks with multiple eavesdroppers
-
Jan
-
Y. Yang, Q. Li, W.-K. Ma, J. Ge, and P. C. Ching, "Cooperative secure beamforming for AF relay networks with multiple eavesdroppers," IEEE Signal Process. Lett., vol. 20, no. 1, pp. 35-38, Jan. 2013.
-
(2013)
IEEE Signal Process. Lett
, vol.20
, Issue.1
, pp. 35-38
-
-
Yang, Y.1
Li, Q.2
Ma, W.-K.3
Ge, J.4
Ching, P.C.5
-
19
-
-
34249313010
-
Tracing malicious relays in cooperative wireless communications
-
Jun
-
Y. Mao and M. Wu, "Tracing malicious relays in cooperative wireless communications," IEEE Trans. Inf. Forensics Security, vol. 2, no. 2, pp. 198-212, Jun. 2007.
-
(2007)
IEEE Trans. Inf. Forensics Security
, vol.2
, Issue.2
, pp. 198-212
-
-
Mao, Y.1
Wu, M.2
-
20
-
-
84878833098
-
On cooperative and malicious behaviors in multirelay fading channels
-
Jul
-
M.-H. Chen, S.-C. Lin, Y.-W. P. Hong, and X. Zhou, "On cooperative and malicious behaviors in multirelay fading channels," IEEE Trans. Inf. Forensics Security, vol. 8, no. 7, pp. 1126-1139, Jul. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.7
, pp. 1126-1139
-
-
Chen, M.-H.1
Lin, S.-C.2
Hong, Y.-W.P.3
Zhou, X.4
-
21
-
-
84938932265
-
Relay channels with confidential messages
-
to be published
-
Y. Oohama, "Relay channels with confidential messages," IEEE Trans. Inf. Theory, to be published. [Online]. Available: http://arxiv.org/abs/cs/ 0611125
-
IEEE Trans. Inf. Theory
-
-
Oohama, Y.1
-
22
-
-
77954584734
-
Cooperation with an untrusted relay: A secrecy perspective
-
Aug
-
X. He and A. Yener, "Cooperation with an untrusted relay: A secrecy perspective," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3807-3827, Aug. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.8
, pp. 3807-3827
-
-
He, X.1
Yener, A.2
-
23
-
-
67249087217
-
Two-hop secure communication using an untrusted relay: A case for cooperative jamming
-
Nov
-
X. He and A. Yener, "Two-hop secure communication using an untrusted relay: A case for cooperative jamming," in Proc. IEEE Global Telecommun. Conf., Nov. 2008, pp. 1-5.
-
(2008)
Proc. IEEE Global Telecommun. Conf
, pp. 1-5
-
-
He, X.1
Yener, A.2
-
24
-
-
76649123145
-
Two-hop secure communication using an untrusted relay
-
May
-
X. He and A. Yener, "Two-hop secure communication using an untrusted relay," EURASIP J. Wireless Commun. Netw., vol. 2009, May 2009, Art. ID. 305146.
-
(2009)
EURASIP J. Wireless Commun. Netw
, vol.2009
-
-
He, X.1
Yener, A.2
-
25
-
-
84555190397
-
Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system
-
Jan
-
C. Jeong, I.-M. Kim, and D. I. Kim, "Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system," IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310-325, Jan. 2012.
-
(2012)
IEEE Trans. Signal Process
, vol.60
, Issue.1
, pp. 310-325
-
-
Jeong, C.1
Kim, I.-M.2
Kim, D.I.3
-
26
-
-
5044252003
-
Cooperative diversity in wireless networks: Efficient protocols and outage behavior
-
Dec
-
J. N. Laneman, D. N. C. Tse, and G.W. Wornell, "Cooperative diversity in wireless networks: Efficient protocols and outage behavior," IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3062-3080, Dec. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.12
, pp. 3062-3080
-
-
Laneman, J.N.1
Tse, D.N.C.2
Wornell, G.W.3
-
27
-
-
84867800602
-
Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes
-
Aug
-
L. Sun, T. Zhang, Y. Li, and H. Niu, "Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes," IEEE Trans. Veh. Technol., vol. 61, no. 8, pp. 3081-3087, Aug. 2012.
-
(2012)
IEEE Trans. Veh. Technol
, vol.61
, Issue.8
, pp. 3081-3087
-
-
Sun, L.1
Zhang, T.2
Li, Y.3
Niu, H.4
-
28
-
-
84877718412
-
Secure communication via an untrusted non-regenerative relay in fading channels
-
Oct
-
J. Huang, A. Mukherjee, and A. L. Swindlehurst, "Secure communication via an untrusted non-regenerative relay in fading channels," IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2536-2550, Oct. 2013.
-
(2013)
IEEE Trans. Signal Process
, vol.61
, Issue.10
, pp. 2536-2550
-
-
Huang, J.1
Mukherjee, A.2
Swindlehurst, A.L.3
-
29
-
-
84903317482
-
Secure transmission with optimal power allocation in untrusted relay networks
-
Jun
-
L. Wang, M. Elkashlan, J. Huang, N. H. Tran, and T. Q. Duong, "Secure transmission with optimal power allocation in untrusted relay networks," IEEE Wireless Commun. Lett., vol. 3, no. 3, pp. 289-292, Jun. 2014.
-
(2014)
IEEE Wireless Commun. Lett
, vol.3
, Issue.3
, pp. 289-292
-
-
Wang, L.1
Elkashlan, M.2
Huang, J.3
Tran, N.H.4
Duong, T.Q.5
-
30
-
-
29144455916
-
High-SNR power offset in multiantenna communication
-
Dec
-
A. Lozano, A. M. Tulino, and S. Verdú, "High-SNR power offset in multiantenna communication," IEEE Trans. Inf. Theory, vol. 51, no. 12, pp. 4134-4151, Dec. 2005.
-
(2005)
IEEE Trans. Inf. Theory
, vol.51
, Issue.12
, pp. 4134-4151
-
-
Lozano, A.1
Tulino, A.M.2
Verdú, S.3
-
31
-
-
77951604986
-
Ergodic capacity analysis of amplify-and-forward MIMO dual-hop systems
-
May
-
S. Jin, M. R. McKay, C. Zhong, and K.-K. Wong, "Ergodic capacity analysis of amplify-and-forward MIMO dual-hop systems," IEEE Trans. Inf. Theory, vol. 56, no. 5, pp. 2204-2224, May 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.5
, pp. 2204-2224
-
-
Jin, S.1
McKay, M.R.2
Zhong, C.3
Wong, K.-K.4
-
32
-
-
84893403880
-
Physical layer security of maximal ratio combining in two-wave with diffuse power fading channels
-
Feb
-
L. Wang, N. Yang, M. Elkashlan, P. L. Yeoh, and J. Yuan, "Physical layer security of maximal ratio combining in two-wave with diffuse power fading channels," IEEE Trans. Inf. Forensics Security, vol. 9, no. 2, pp. 247-258, Feb. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.2
, pp. 247-258
-
-
Wang, L.1
Yang, N.2
Elkashlan, M.3
Yeoh, P.L.4
Yuan, J.5
-
34
-
-
84988277250
-
Programming with linear fractional functionals
-
Dec
-
A. Charnes and A. A. Cooper, "Programming with linear fractional functionals," Naval Res. Logist. Quart., vol. 9, no. 3/4, pp. 81-186, Dec. 1962.
-
(1962)
Naval Res. Logist. Quart
, vol.9
, Issue.3-4
, pp. 81-186
-
-
Charnes, A.1
Cooper, A.A.2
-
35
-
-
0033296299
-
Using SeDuMi 1.02, a MATLAB toolbox for optimization over symmetric cones
-
J. F. Sturm, "Using SeDuMi 1.02, a MATLAB toolbox for optimization over symmetric cones," Optim. Methods Softw., vol. 11, no. 4, pp. 625-653, 1999.
-
(1999)
Optim. Methods Softw
, vol.11
, Issue.4
, pp. 625-653
-
-
Sturm, J.F.1
-
36
-
-
79957939502
-
New results on Hermitian matrix rank-one decomposition
-
Aug
-
W. Ai, Y. Huang, and S. Zhang, "New results on Hermitian matrix rank-one decomposition," Math. Program., vol. 128, no. 1, pp. 253-283, Aug. 2009.
-
(2009)
Math. Program
, vol.128
, Issue.1
, pp. 253-283
-
-
Ai, W.1
Huang, Y.2
Zhang, S.3
-
37
-
-
0004236492
-
-
Baltimore, MD, USA: The Johns Hopkins Univ. Press
-
G. H. Golub and C. F. V. Loan, Matrix Computations. Baltimore, MD, USA: The Johns Hopkins Univ. Press, 1996.
-
(1996)
Matrix Computations
-
-
Golub, G.H.1
Loan, C.F.V.2
-
38
-
-
34247359530
-
Optimal design of non-regenerative MIMO wireless relays
-
Apr
-
X. Tang and Y. Hua, "Optimal design of non-regenerative MIMO wireless relays," IEEE Trans. Wireless Commun., vol. 6, no. 4, pp. 1398-1407, Apr. 2007.
-
(2007)
IEEE Trans. Wireless Commun
, vol.6
, Issue.4
, pp. 1398-1407
-
-
Tang, X.1
Hua, Y.2
-
39
-
-
34249775806
-
Linear transceiver design in nonregenerative relays with channel state information
-
Jun
-
O. Muñoz-Medina, J. Vidal, and A. Agustín, "Linear transceiver design in nonregenerative relays with channel state information," IEEE Trans. Signal Process., vol. 55, pp. 2593-2604, Jun. 2007.
-
(2007)
IEEE Trans. Signal Process
, vol.55
, pp. 2593-2604
-
-
Muñoz-Medina, O.1
Vidal, J.2
Agustín, A.3
|