-
1
-
-
45249104850
-
'Wireless information-theoretic security'
-
Bloch, M., Barros, J., Rodriques, M.R.D.: 'Wireless information-theoretic security', IEEE Trans. Inf. Theory, 2008, 54, (6), pp. 2515-2534 (doi: 10.1109/TIT.2008.921908)
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodriques, M.R.D.3
-
2
-
-
84941267713
-
'Joint relay selection and cooperative beamforming in two-hop multi-relay decode-and-forward networks'
-
Moharre, H., Olfat, A.: 'Joint relay selection and cooperative beamforming in two-hop multi-relay decode-and-forward networks', IET Commun., 2014, 8, (18), pp. 3245-3253 (doi: 10.1049/iet-com.2014.0408)
-
(2014)
IET Commun
, vol.8
, Issue.18
, pp. 3245-3253
-
-
Moharre, H.1
Olfat, A.2
-
3
-
-
84929839413
-
'Secure cooperative communication via artificial noise for wireless two-hop relaying networks'
-
Zhou, N.R., Kang, Z.J., Liang, X.R.: 'Secure cooperative communication via artificial noise for wireless two-hop relaying networks', Wirel. Pers. Commun., 2015, 82, (3), pp. 1759-1771 (doi: 10.1007/s11277-015-2311-8)
-
(2015)
Wirel. Pers. Commun
, vol.82
, Issue.3
, pp. 1759-1771
-
-
Zhou, N.R.1
Kang, Z.J.2
Liang, X.R.3
-
4
-
-
84877718412
-
'Secure communication via an untrusted non-regenerative relay in fading channels'
-
Huang, J., Mukherjee, A., Swindlehurst, A.L.: 'Secure communication via an untrusted non-regenerative relay in fading channels', IEEE Trans. Signal Process., 2013, 61, (10), pp. 2536-2550 (doi: 10.1109/TSP.2013.2247600)
-
(2013)
IEEE Trans. Signal Process
, vol.61
, Issue.10
, pp. 2536-2550
-
-
Huang, J.1
Mukherjee, A.2
Swindlehurst, A.L.3
-
5
-
-
80051752373
-
'Two-hop secure communication using an untrusted relay: a case for cooperative jamming'
-
New Orleans, LA, December
-
He, X., Yener, A.: 'Two-hop secure communication using an untrusted relay: a case for cooperative jamming'. Proc. IEEE Globecom, New Orleans, LA, December 2008, pp. 1-5
-
(2008)
Proc. IEEE Globecom
, pp. 1-5
-
-
He, X.1
Yener, A.2
-
6
-
-
77954584734
-
'Cooperation with an untrusted relay: a secrecy perspective'
-
He, X., Yener, A.: 'Cooperation with an untrusted relay: a secrecy perspective', IEEE Trans. Inf. Theory, 2010, 56, (8), pp. 3807-3827 (doi: 10.1109/TIT.2010.2050958)
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.8
, pp. 3807-3827
-
-
He, X.1
Yener, A.2
-
7
-
-
84903317482
-
'Secure transmission with optimal power allocation in untrusted relay networks'
-
Wang, L., Elkashlan, M., Huang, J.: 'Secure transmission with optimal power allocation in untrusted relay networks', IEEE Wirel. Commun. Lett., 2014, 3, (3), pp. 289-292 (doi: 10.1109/WCL.2014.031114.140018)
-
(2014)
IEEE Wirel. Commun. Lett
, vol.3
, Issue.3
, pp. 289-292
-
-
Wang, L.1
Elkashlan, M.2
Huang, J.3
-
8
-
-
84867800602
-
'Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes'
-
Sun, L., Zhang, T., Li, Y.: 'Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes', IEEE Trans. Veh. Technol., 2012, 61, (8), pp. 3801-3807 (doi: 10.1109/TVT.2012.2207438)
-
(2012)
IEEE Trans. Veh. Technol
, vol.61
, Issue.8
, pp. 3801-3807
-
-
Sun, L.1
Zhang, T.2
Li, Y.3
-
9
-
-
84924902824
-
'Security-aware relaying scheme for cooperative networks with untrusted relay nodes'
-
Sun, L., Ren, P., Du, Q.: 'Security-aware relaying scheme for cooperative networks with untrusted relay nodes', IEEE Commun. Lett., 2014, 19, (3), pp. 463-466 (doi: 10.1109/LCOMM.2014.2385095)
-
(2014)
IEEE Commun. Lett
, vol.19
, Issue.3
, pp. 463-466
-
-
Sun, L.1
Ren, P.2
Du, Q.3
-
10
-
-
84894546899
-
'Secrecy rate of two-hop AF relaying networks with an untrusted relay'
-
Zhou, N.R., Chen, X., Li, C.: 'Secrecy rate of two-hop AF relaying networks with an untrusted relay', Wirel. Pers. Commun., 2014, 75, (1), pp. 119-129 (doi: 10.1007/s11277-013-1351-1)
-
(2014)
Wirel. Pers. Commun
, vol.75
, Issue.1
, pp. 119-129
-
-
Zhou, N.R.1
Chen, X.2
Li, C.3
-
11
-
-
84961675624
-
'Joint optimal power allocation and relay selection to establish secure transmission in uplink transmission of untrusted relays network'
-
Kuhestani, A., Mohammadi, A., Masoudi, M.: 'Joint optimal power allocation and relay selection to establish secure transmission in uplink transmission of untrusted relays network', IET Netw., 2016, 5, (2), pp. 30-36 (doi: 10.1049/iet-net.2015.0035)
-
(2016)
IET Netw
, vol.5
, Issue.2
, pp. 30-36
-
-
Kuhestani, A.1
Mohammadi, A.2
Masoudi, M.3
-
12
-
-
84969546646
-
'Optimal power allocation to improve secrecy performance of non-regenerative cooperative systems using an untrusted relay'
-
Kuhestani, A., Mohammadi, A., Noori, M.: 'Optimal power allocation to improve secrecy performance of non-regenerative cooperative systems using an untrusted relay', IET Commun., 2016, 10, (8), pp. 962-968 (doi: 10.1049/iet-com.2015.0876)
-
(2016)
IET Commun
, vol.10
, Issue.8
, pp. 962-968
-
-
Kuhestani, A.1
Mohammadi, A.2
Noori, M.3
-
13
-
-
84864981981
-
'Energy efficient relay selection for two-way relay system'
-
May
-
Sun, Q., Li, L., Song, L.: 'Energy efficient relay selection for two-way relay system'. Proc. IEEE Vehicular Technology Conf. (VTC Spring), May 2012, pp. 1-5
-
(2012)
Proc. IEEE Vehicular Technology Conf. (VTC Spring)
, pp. 1-5
-
-
Sun, Q.1
Li, L.2
Song, L.3
-
14
-
-
84877584209
-
'Energy-efficient optimization for physical layer security in multi-antenna downlink networks with QoS guarantee'
-
Chen, X., Lei, L.: 'Energy-efficient optimization for physical layer security in multi-antenna downlink networks with QoS guarantee', IEEE Commun. Lett., 2013, 17, (4), pp. 537-540 (doi: 10.1109/LCOMM.2013.022713.130029)
-
(2013)
IEEE Commun. Lett
, vol.17
, Issue.4
, pp. 537-540
-
-
Chen, X.1
Lei, L.2
-
15
-
-
84907205584
-
'Energy-efficient precoder design for MIMO wiretap channels'
-
Zhang, H., Huang, Y., Li, S.: 'Energy-efficient precoder design for MIMO wiretap channels', IEEE Commun. Lett., 2014, 18, (9), pp. 1559-1562 (doi: 10.1109/LCOMM.2014.2331273)
-
(2014)
IEEE Commun. Lett
, vol.18
, Issue.9
, pp. 1559-1562
-
-
Zhang, H.1
Huang, Y.2
Li, S.3
-
16
-
-
84962184577
-
'Achieving high energy efficiency and physical-layer security in AF relaying'
-
Wang, D., Bai, B., Chen, W.: 'Achieving high energy efficiency and physical-layer security in AF relaying', IEEE Trans. Wirel. Commun., 2015, 15, pp. 740-752 (doi: 10.1109/TWC.2015.2477510)
-
(2015)
IEEE Trans. Wirel. Commun
, vol.15
, pp. 740-752
-
-
Wang, D.1
Bai, B.2
Chen, W.3
-
17
-
-
67651180823
-
'Performance analysis of beamforming in two hop amplify and forward relay networks with antenna correlation'
-
Louie, R.H.Y., Li, Y., Suraweera, H.A.: 'Performance analysis of beamforming in two hop amplify and forward relay networks with antenna correlation', IEEE Trans. Wirel. Commun., 2009, 8, (6), pp. 3132-3141 (doi: 10.1109/TWC.2009.080807)
-
(2009)
IEEE Trans. Wirel. Commun
, vol.8
, Issue.6
, pp. 3132-3141
-
-
Louie, R.H.Y.1
Li, Y.2
Suraweera, H.A.3
-
18
-
-
84906698210
-
'Principles of physical layer security in multiuser wireless networks: a survey'
-
Mukherjee, A., Fakoorian, S., Huang, J.: 'Principles of physical layer security in multiuser wireless networks: a survey', IEEE Commun. Surv. Tutor., 2014, 16, (3), pp. 1550-1573 (doi: 10.1109/SURV.2014.012314.00178)
-
(2014)
IEEE Commun. Surv. Tutor
, vol.16
, Issue.3
, pp. 1550-1573
-
-
Mukherjee, A.1
Fakoorian, S.2
Huang, J.3
-
19
-
-
84904627710
-
'Performance evaluation and optimization for two-way relaying with multi-antenna sources'
-
Yadav, S., Upadhyay, P.K., Prakriya, S.: 'Performance evaluation and optimization for two-way relaying with multi-antenna sources', IEEE Trans. Veh. Technol., 2014, 63, (6), pp. 2982-2989 (doi: 10.1109/TVT.2013.2296304)
-
(2014)
IEEE Trans. Veh. Technol
, vol.63
, Issue.6
, pp. 2982-2989
-
-
Yadav, S.1
Upadhyay, P.K.2
Prakriya, S.3
-
20
-
-
53149112079
-
'Amplify-and-forward with partial relay selection'
-
Krikidis, I., Thompson, J., McLaughlin, S.: 'Amplify-and-forward with partial relay selection', IEEE Commun. Lett., 2008, 12, (4), pp. 235-237 (doi: 10.1109/LCOMM.2008.071987)
-
(2008)
IEEE Commun. Lett
, vol.12
, Issue.4
, pp. 235-237
-
-
Krikidis, I.1
Thompson, J.2
McLaughlin, S.3
|