-
1
-
-
33646932650
-
A primer on crypography in communications
-
Kartalopoulos, S.V.: A primer on crypography in communications, IEEE Commun. Mag., 2006, 44, (4), pp. 146-151
-
(2006)
IEEE Commun. Mag.
, vol.44
, Issue.4
, pp. 146-151
-
-
Kartalopoulos, S.V.1
-
2
-
-
0016562514
-
The wire-tap channel
-
Wyner, A.D.: The wire-tap channel, Bell Syst. Tech. J., 1975, 54, (8), pp. 1355-1387
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
3
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Dong, L., Han, Z., Petropulu, A.P., et al.: Improving wireless physical layer security via cooperating relays, IEEE Trans. Signal Process., 2010, 58, (3), pp. 1875-1888
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
-
4
-
-
80052870842
-
On cooperative relaying schemes for wireless physical layer security
-
Li, J., Petropulu, A.P., Weber, S.: On cooperative relaying schemes for wireless physical layer security, IEEE Trans. Signal Process., 2011, 59, (10), pp. 4985-4997
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 4985-4997
-
-
Li, J.1
Petropulu, A.P.2
Weber, S.3
-
5
-
-
84920830630
-
Secrecy transmission with a helper: to relay or to jam
-
Deng, H., Wang, H., Guo, W., et al.: Secrecy transmission with a helper: to relay or to jam, IEEE Trans. Inf. Forensics Sec., 2015, 10, (2), pp. 293-307
-
(2015)
IEEE Trans. Inf. Forensics Sec.
, vol.10
, Issue.2
, pp. 293-307
-
-
Deng, H.1
Wang, H.2
Guo, W.3
-
6
-
-
77957340850
-
Opportunistic relay selection for cooperative networks with secrecy constraints
-
Krikidis, I.: Opportunistic relay selection for cooperative networks with secrecy constraints, IET Commun., 2010, 4, (15), pp. 1787-1791
-
(2010)
IET Commun.
, vol.4
, Issue.15
, pp. 1787-1791
-
-
Krikidis, I.1
-
7
-
-
84884537599
-
Optimal relay selection for physical-layer security in cooperative wireless networks
-
Zou, Y.,Wang, X., Shen,W.: Optimal relay selection for physical-layer security in cooperative wireless networks, IEEE J. Sel. Areas Commun., 2013, 31, (10), pp. 2099-2111
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.10
, pp. 2099-2111
-
-
Zou, Y.1
Wang, X.2
Shen, W.3
-
8
-
-
84921773816
-
Secure relay and jammer selection for physical layer security
-
Hui, H., Swindlehurst, A.L., Li, G., et al.: Secure relay and jammer selection for physical layer security, IEEE Signal Process. Lett., 2015, 22, (8), pp. 1147-1151
-
(2015)
IEEE Signal Process. Lett.
, vol.22
, Issue.8
, pp. 1147-1151
-
-
Hui, H.1
Swindlehurst, A.L.2
Li, G.3
-
9
-
-
80052157752
-
Cooperative jamming and power allocation for wireless relay networks in presence of eavesdropper
-
Dong, L., Yousefizadeh, H., Jafarkhani, H.: Cooperative jamming and power allocation for wireless relay networks in presence of eavesdropper. Proc. IEEE ICC, Kyoto, Japan, 2011, pp. 1-5
-
(2011)
Proc. IEEE ICC, Kyoto, Japan
, pp. 1-5
-
-
Dong, L.1
Yousefizadeh, H.2
Jafarkhani, H.3
-
10
-
-
85027929481
-
Opportunistic relaying for secrecy communications: cooperative jamming vs. relay chatting
-
Ding, Z., Leung, K.K., Goeckel, D.L., et al.: Opportunistic relaying for secrecy communications: cooperative jamming vs. relay chatting, IEEE Trans. Wirel. Commun., 2011, 10, (6), pp. 1725-1729
-
(2011)
IEEE Trans. Wirel. Commun.
, vol.10
, Issue.6
, pp. 1725-1729
-
-
Ding, Z.1
Leung, K.K.2
Goeckel, D.L.3
-
11
-
-
84876796391
-
Destination assisted cooperative jamming for wireless physical-layer security
-
Liu, Y., Li, J., Petropulu, A.P.: Destination assisted cooperative jamming for wireless physical-layer security, IEEE Trans. Inf. Forensics Sec., 2013, 8, (4), pp. 682-694
-
(2013)
IEEE Trans. Inf. Forensics Sec.
, vol.8
, Issue.4
, pp. 682-694
-
-
Liu, Y.1
Li, J.2
Petropulu, A.P.3
-
12
-
-
84883380753
-
On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming
-
Park, K.-H., Wang, T., Alouini, M.-S.: On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming, IEEE J. Sel. Areas Commun., 2013, 31, (9), pp. 1741-1750
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
, pp. 1741-1750
-
-
Park, K.-H.1
Wang, T.2
Alouini, M.-S.3
-
13
-
-
84922896499
-
Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks
-
Wang, C., Wang, H.-M., Xia, X.-G.: Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks, IEEE Trans. Wirel. Commun., 2015, 14, (2), pp. 589-605
-
(2015)
IEEE Trans. Wirel. Commun.
, vol.14
, Issue.2
, pp. 589-605
-
-
Wang, C.1
Wang, H.-M.2
Xia, X.-G.3
-
14
-
-
84870512709
-
Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdroppers CSI
-
Wang, H.-M., Luo, M., Xia, X.-G., et al.: Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdroppers CSI, IEEE Signal Process. Lett., 2013, 20, (1), pp. 39-42
-
(2013)
IEEE Signal Process. Lett.
, vol.20
, Issue.1
, pp. 39-42
-
-
Wang, H.-M.1
Luo, M.2
Xia, X.-G.3
-
15
-
-
84888318377
-
Hybrid beamforming and jamming for physical-layer security of two-way relay networks
-
Wang, H.-M., Luo, M., Yin, Q.: Hybrid beamforming and jamming for physical-layer security of two-way relay networks, IEEE Trans. Inf. Forensics Sec., 2012, 8, (12), pp. 2007-2020
-
(2012)
IEEE Trans. Inf. Forensics Sec.
, vol.8
, Issue.12
, pp. 2007-2020
-
-
Wang, H.-M.1
Luo, M.2
Yin, Q.3
-
16
-
-
77954584734
-
Cooperation with an untrusted relay: a secrecy perspective
-
He, X., Yener, A.: Cooperation with an untrusted relay: a secrecy perspective, IEEE Trans. Inf. Theory, 2010, 56, (8), pp. 3807-3827
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.8
, pp. 3807-3827
-
-
He, X.1
Yener, A.2
-
17
-
-
84933057122
-
Opportunistic transmission of nongenerative network with untrusted relay
-
Ju, M., Kim, D.-H., Hwang, K.-S.: Opportunistic transmission of nongenerative network with untrusted relay, IEEE Trans. Veh. Technol., 2015, 64, (6), pp. 2703-2709
-
(2015)
IEEE Trans. Veh. Technol.
, vol.64
, Issue.6
, pp. 2703-2709
-
-
Ju, M.1
Kim, D.-H.2
Hwang, K.-S.3
-
18
-
-
84891634602
-
Link adaption with untrusted relay assignment: design and performance analysis
-
Khodakarami, H., Lahouti, F.: Link adaption with untrusted relay assignment: design and performance analysis, IEEE Trans. Commun., 2013, 61, (12), pp. 4874-4883
-
(2013)
IEEE Trans. Commun.
, vol.61
, Issue.12
, pp. 4874-4883
-
-
Khodakarami, H.1
Lahouti, F.2
-
19
-
-
84877718412
-
Secure communication via an untrusted non-regenerative relay in fading channels
-
Huang, J., Mukherjee, A., Swindlehurst, A.L.: Secure communication via an untrusted non-regenerative relay in fading channels, IEEE Trans. Signal Process., 2013, 61, (10), pp. 2536-2550
-
(2013)
IEEE Trans. Signal Process.
, vol.61
, Issue.10
, pp. 2536-2550
-
-
Huang, J.1
Mukherjee, A.2
Swindlehurst, A.L.3
-
20
-
-
84867800602
-
Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes
-
Sun, L., Zhang, T., Li, Y., et al.: Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes, IEEE Trans. Veh. Technol., 2012, 61, (8), pp. 3801-3807
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.8
, pp. 3801-3807
-
-
Sun, L.1
Zhang, T.2
Li, Y.3
-
21
-
-
84924902824
-
Security-aware relaying scheme for cooperative networks with untrusted relay nodes
-
Sun, L., Ren, P., Du, Q., et al.: Security-aware relaying scheme for cooperative networks with untrusted relay nodes, IEEE Commun. Lett., 2015, 19, (3), pp. 463-466
-
(2015)
IEEE Commun. Lett.
, vol.19
, Issue.3
, pp. 463-466
-
-
Sun, L.1
Ren, P.2
Du, Q.3
-
22
-
-
84903317482
-
Secure transmission with optimal power allocation in untrusted relay networks
-
Wang, L., Elkashlan, M., Huang, J., et al.: Secure transmission with optimal power allocation in untrusted relay networks, IEEE Wirel. Commun. Lett., 2014, 3, (3), pp. 289-292
-
(2014)
IEEE Wirel. Commun. Lett.
, vol.3
, Issue.3
, pp. 289-292
-
-
Wang, L.1
Elkashlan, M.2
Huang, J.3
-
23
-
-
79960885380
-
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
-
Wang, Q., Su, H., Ren, K., et al.: Fast and scalable secret key generation exploiting channel phase randomness in wireless networks. Proc. INFCOM, Shanghai, China, 2011, pp. 1422-1430
-
(2011)
Proc. INFCOM, Shanghai, China
, pp. 1422-1430
-
-
Wang, Q.1
Su, H.2
Ren, K.3
-
24
-
-
84883100210
-
Fast secret key generation in static wireless networks: a virtual channel approach
-
Huang, P., Wang, X.: Fast secret key generation in static wireless networks: a virtual channel approach. Proc. IEEE INFOCOM, Turin, Italy, 2013, pp. 2292-2300
-
(2013)
Proc. IEEE INFOCOM, Turin, Italy
, pp. 2292-2300
-
-
Huang, P.1
Wang, X.2
-
25
-
-
70450242725
-
On the effectiveness of secret key extraction from wireless signal strength in real environments
-
Jana, S., Premnath, S., Clark, M., et al.: On the effectiveness of secret key extraction from wireless signal strength in real environments. Proc. ACM MOBICOM, Beijing, China, 2009, pp. 321-332
-
(2009)
Proc. ACM MOBICOM, Beijing, China
, pp. 321-332
-
-
Jana, S.1
Premnath, S.2
Clark, M.3
-
26
-
-
84867799883
-
Physical layer security for two-way untrusted relaying with friendly jammers
-
Zhang, R., Song, L., Han, Z., et al.: Physical layer security for two-way untrusted relaying with friendly jammers, IEEE Trans. Veh. Technol., 2012, 61, (8), pp. 3693-3704
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.8
, pp. 3693-3704
-
-
Zhang, R.1
Song, L.2
Han, Z.3
-
27
-
-
34548074211
-
Improving amplify-and-forward relay networks: optimal power allocation versus selection
-
Zhao, Y., Adve, R., Lim, T.J.: Improving amplify-and-forward relay networks: optimal power allocation versus selection, IEEE Trans. Wirel. Commun., 2007, 6, (8), pp. 3114-3123
-
(2007)
IEEE Trans. Wirel. Commun.
, vol.6
, Issue.8
, pp. 3114-3123
-
-
Zhao, Y.1
Adve, R.2
Lim, T.J.3
-
28
-
-
28244477514
-
Power allocation for cooperative relaying in wireless networks
-
Deng, X., Haimovich, A.M.: Power allocation for cooperative relaying in wireless networks, IEEE Commun. Lett., 2005, 9, (11), pp. 994-996
-
(2005)
IEEE Commun. Lett.
, vol.9
, Issue.11
, pp. 994-996
-
-
Deng, X.1
Haimovich, A.M.2
-
29
-
-
84982305842
-
Joint relay and jammer selection improves the physical layer security in the face of CSI feedback delays
-
WangL., Cai, Y., Zou, Y., et al.: Joint relay and jammer selection improves the physical layer security in the face of CSI feedback delays, IEEE Trans. Veh. Technol., 2016, 65, (8), pp. 6259-6274
-
(2016)
IEEE Trans. Veh. Technol.
, vol.65
, Issue.8
, pp. 6259-6274
-
-
Wang, L.1
Cai, Y.2
Zou, Y.3
-
30
-
-
0003498504
-
Table of integrals, series, and products
-
7th edn, (Academic, San Diego
-
Gradshteyn, I.S., Ryzhik, I.M.: Table of integrals, series, and products (Academic, San Diego, 2007, 7th edn.)
-
(2007)
-
-
Gradshteyn, I.S.1
Ryzhik, I.M.2
-
31
-
-
5044252003
-
Cooperative diversity in wireless networks: efficient protocols and outage behavior
-
Laneman, J.N., Tse, D.N.C., Wornell, G.W.: Cooperative diversity in wireless networks: efficient protocols and outage behavior, IEEE Trans. Inf. Theory, 2004, 50, (12), pp. 3062-3080
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.12
, pp. 3062-3080
-
-
Laneman, J.N.1
Tse, D.N.C.2
Wornell, G.W.3
-
32
-
-
0842267629
-
Limiting analysis of outage probabilities for diversity schemes in fading channels
-
Laneman, J.N.: Limiting analysis of outage probabilities for diversity schemes in fading channels. Proc. IEEE GLOBECOM, San Francisco, CA, 2003, pp. 1242-1246
-
(2003)
Proc. IEEE GLOBECOM, San Francisco, CA
, pp. 1242-1246
-
-
Laneman, J.N.1
|