-
1
-
-
45249104850
-
Wireless information-theoretic security
-
June
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, “Wireless information-theoretic security,” IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515–2534, June 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
2
-
-
84890522850
-
Communication theory of secrecy systems
-
C. Shannon, “Communication theory of secrecy systems,” Bell Syst. Technical J., vol. 28, no. 4, pp. 656–715, 1949.
-
(1949)
Bell Syst. Technical J.
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.1
-
3
-
-
0016562514
-
Wire-tap channel
-
A. Wyner, “Wire-tap channel,” Bell Syst. Technical J., vol. 54, no. 8, pp. 1355–1387, 1975.
-
(1975)
Bell Syst. Technical J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.1
-
4
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
Sept.
-
L. Lai and H. E. Gamal, “The relay-eavesdropper channel: Cooperation for secrecy,” IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005–4019, Sept. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.9
, pp. 4005-4019
-
-
Lai, L.1
Gamal, H.E.2
-
5
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, “Improving wireless physical layer security via cooperating relays,” IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875–2010, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.3
, pp. 1875-2010
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
6
-
-
79951618084
-
Optimal cooperative jamming to enhance physical layer security using relays
-
Mar.
-
G. Zheng, L. -C. Choo, and K. -K. Wong, “Optimal cooperative jamming to enhance physical layer security using relays,” IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317–1322, Mar. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.3
, pp. 1317-1322
-
-
Zheng, G.1
Choo, L.-C.2
Wong, K.-K.3
-
7
-
-
77953707901
-
Relay beamforming strategies for physical-layer security
-
Mar.
-
J. Zhang and M. Gursoy, “Relay beamforming strategies for physical-layer security,” in Proc. CISS, Mar. 2010, pp. 1–6.
-
(2010)
Proc. CISS
, pp. 1-6
-
-
Zhang, J.1
Gursoy, M.2
-
8
-
-
79551634548
-
Physical layer security for two way relay communications with friendly jammers
-
Dec.
-
R. Zhang, L. Song, Z. Han, B. Jiao, and M. Debbah, “Physical layer security for two way relay communications with friendly jammers,” in Proc. IEEE GLOBECOM, Dec. 2010.
-
(2010)
Proc. IEEE GLOBECOM
-
-
Zhang, R.1
Song, L.2
Han, Z.3
Jiao, B.4
Debbah, M.5
-
9
-
-
78751552574
-
On the zero forcing optimality for friendly jamming in MISO wiretap channels
-
June
-
A. Wolf and E. A. Jorswieck, “On the zero forcing optimality for friendly jamming in MISO wiretap channels,” in Proc. IEEE SPAWC, June 2010, p. 1.
-
(2010)
Proc. IEEE SPAWC
, pp. 1
-
-
Wolf, A.1
Jorswieck, E.A.2
-
10
-
-
79960399745
-
Robust beamforming for security in MIMO wiretap channels with imperfect CSI
-
Jan.
-
A. Mukherjee and A. L. Swindlehurst, “Robust beamforming for security in MIMO wiretap channels with imperfect CSI,” IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351–361, Jan. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.1
, pp. 351-361
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
11
-
-
77957340850
-
Opportunistic relay selection for cooperative networks with secrecy constraints
-
Oct.
-
I. Krikidis, “Opportunistic relay selection for cooperative networks with secrecy constraints,” IET Commun., vol. 4, no. 15, pp. 1787–1791, Oct. 2010.
-
(2010)
IET Commun.
, vol.4
, Issue.15
, pp. 1787-1791
-
-
Krikidis, I.1
-
12
-
-
70350583050
-
Relay selection for secure cooperative networks with jamming
-
Oct.
-
I. Krikidis, J. S. Thompson, and S. McLaughlin, “Relay selection for secure cooperative networks with jamming,” IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5003–5011, Oct. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.10
, pp. 5003-5011
-
-
Krikidis, I.1
Thompson, J.S.2
McLaughlin, S.3
-
14
-
-
0004236492
-
-
3rd ed., Baltimore, MD: The Johns Hopkins Univ. Press
-
G. H. Golub and C. F. V. Loan, Matrix Computations. 3rd ed., Baltimore, MD: The Johns Hopkins Univ. Press, 1996.
-
(1996)
Matrix Computations
-
-
Golub, G.H.1
Loan, C.F.V.2
-
15
-
-
84865003969
-
-
3rd Generation Partnership Project Std. 3GPP TS 25. 214 V10. 1. 0, December
-
Physical layer procedures (FDD), 3rd Generation Partnership Project Std. 3GPP TS 25. 214 V10. 1. 0, December 2010.
-
(2010)
Physical layer procedures (FDD)
-
-
|