-
1
-
-
54849430727
-
Identity based key management in mobile ad hoc networks: Techniques and applications
-
Oct.
-
E. D. Silva, A. L. D. Santos, L. C. P. Albini, and M. Lima, "Identity based key management in mobile ad hoc networks: Techniques and applications, " IEEE Trans. Wireless Commun., vol. 15, no. 5, pp. 46-52, Oct. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.15
, Issue.5
, pp. 46-52
-
-
Silva, E.D.1
Santos, A.L.D.2
Albini, L.C.P.3
Lima, M.4
-
2
-
-
45249101530
-
The general Gaussian multiple access and twoway wire-tap channels: Achievable rates and cooperative jamming
-
June
-
E. Tekin and A. Yener, "The general Gaussian multiple access and twoway wire-tap channels: achievable rates and cooperative jamming, " IEEE Trans. Inform. Theory, vol. 54, pp. 2735-2751, June 2008.
-
(2008)
IEEE Trans. Inform. Theory
, vol.54
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
3
-
-
67649499991
-
Wireless secrecy in cellular systems with infrastructure-aided cooperation
-
June
-
P. Popovski and O. Simeone, "Wireless secrecy in cellular systems with infrastructure-aided cooperation, " IEEE Trans. Inform. Forensics and Security, vol. 4, no. 2, pp. 242-256, June 2009.
-
(2009)
IEEE Trans. Inform. Forensics and Security
, vol.4
, Issue.2
, pp. 242-256
-
-
Popovski, P.1
Simeone, O.2
-
4
-
-
85032613550
-
Secure resource allocation for OFDMa two-way relay wireless sensor networks without and with cooperative jamming
-
H. Zhang, H. Xing, J. Cheng, A. Nallanathan, and V. Leung, "Secure resource allocation for OFDMa two-way relay wireless sensor networks without and with cooperative jamming, " accepted by IEEE Trans. Industrial Inf., 2015.
-
(2015)
IEEE Trans. Industrial Inf.
-
-
Zhang, H.1
Xing, H.2
Cheng, J.3
Nallanathan, A.4
Leung, V.5
-
5
-
-
84896908427
-
Max-ratio relay selection in secure buffer-aided cooperative wireless networks
-
Apr.
-
G. Chen, Z. Tian, Y. Gong, Z. Chen, and J. A. Chambers, "Max-ratio relay selection in secure buffer-aided cooperative wireless networks, " IEEE Trans. Inform. Forensics and Security, vol. 9, no. 4, pp. 719-729, Apr. 2014.
-
(2014)
IEEE Trans. Inform. Forensics and Security
, vol.9
, Issue.4
, pp. 719-729
-
-
Chen, G.1
Tian, Z.2
Gong, Y.3
Chen, Z.4
Chambers, J.A.5
-
6
-
-
66949180834
-
A note on the secrecy capacity of the multipleantenna wiretap channel
-
June
-
T. Liu and S. Shamai, "A note on the secrecy capacity of the multipleantenna wiretap channel, " IEEE Trans. Information Theory, vol. 55, pp. 2547-2553, June 2009.
-
(2009)
IEEE Trans. Information Theory
, vol.55
, pp. 2547-2553
-
-
Liu, T.1
Shamai, S.2
-
7
-
-
70350706020
-
The capacity region of the degraded multiple-input multiple-output compound broadcast channel
-
Nov.
-
H. Weingarten, T. Liu, S. Shamai, Y. Steinberg, and P. Viswanath, "The capacity region of the degraded multiple-input multiple-output compound broadcast channel, " IEEE Trans. Inf. Theory, vol. 55, pp. 5011-5023, Nov. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, pp. 5011-5023
-
-
Weingarten, H.1
Liu, T.2
Shamai, S.3
Steinberg, Y.4
Viswanath, P.5
-
8
-
-
84922811042
-
Physical layer network security in the full-duplex relay system
-
Apr.
-
G. Chen, Y. Gong, P. Xiao, and J. A. Chambers, "Physical layer network security in the full-duplex relay system, " IEEE Trans. Inform. Forensics and Security, vol. 10, no. 3, pp. 574-583, Apr. 2015.
-
(2015)
IEEE Trans. Inform. Forensics and Security
, vol.10
, Issue.3
, pp. 574-583
-
-
Chen, G.1
Gong, Y.2
Xiao, P.3
Chambers, J.A.4
-
9
-
-
85014200295
-
Dual antenna selection in secure cognitive radio networks
-
G. Chen, Y. Gong, P. Xiao, and J. A. Chambers, "Dual antenna selection in secure cognitive radio networks, " to appear IEEE Trans. Veh. Technol., 2016.
-
(2016)
IEEE Trans. Veh. Technol.
-
-
Chen, G.1
Gong, Y.2
Xiao, P.3
Chambers, J.A.4
-
10
-
-
64549128283
-
Secure wireless communications via cooperation
-
Illinois, Sep.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Secure wireless communications via cooperation, " in Proc. 46th Ann. Allerton Conf. Communication, Control, and Computing, UIUC, Illinois, Sep. 2008.
-
(2008)
Proc. 46th Ann. Allerton Conf. Communication, Control, and Computing, UIUC
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
11
-
-
70349218031
-
Amplify-and-forward based cooperation for secure wireless communications
-
Taipei, Taiwan, Apr.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Amplify-and-forward based cooperation for secure wireless communications, " in Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing, Taipei, Taiwan, Apr. 2009.
-
(2009)
Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
12
-
-
52349086199
-
The secrecy graph and some of its properties
-
July, Canada, Toronto
-
M. Haenggi, "The secrecy graph and some of its properties, " in Proc. IEEE Int. Symp. Inf. Theory, Toronto, Canada, pp. 539-543, July 2008.
-
(2008)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 539-543
-
-
Haenggi, M.1
-
13
-
-
62949215603
-
Physical-layer security in stochastic wireless networks
-
Nov., Guangzhou, China
-
P. C. Pinto, J. Barros, and M. Z. Win, "Physical-layer security in stochastic wireless networks, " in Proc. IEEE Int. Conf. Commun. Syst., Guangzhou, China, pp. 974-979, Nov. 2008.
-
(2008)
Proc. IEEE Int. Conf. Commun. Syst.
, pp. 974-979
-
-
Pinto, P.C.1
Barros, J.2
Win, M.Z.3
-
14
-
-
84860402665
-
On the throughput cost of physical layer security in decentralized wireless networks
-
Aug.
-
X. Zhou, R. K. Ganti, J. G. Andrews, and A. Hjorungnes, "On the throughput cost of physical layer security in decentralized wireless networks, " IEEE Transactions on Wireless Communications, vol. 10, pp. 2764-2775, Aug. 2011.
-
(2011)
IEEE Transactions on Wireless Communications
, vol.10
, pp. 2764-2775
-
-
Zhou, X.1
Ganti, R.K.2
Andrews, J.G.3
Hjorungnes, A.4
-
15
-
-
84901335099
-
Secrecy rates in broadcast channels with confidential messages and external eavesdroppers
-
May
-
G. Geraci, S. Singh, J. G. Andrews, J. Yuan, and I. B. Collings, "Secrecy rates in broadcast channels with confidential messages and external eavesdroppers, " IEEE Trans. on Wireless Commun., vol. 13, pp. 2931-2943, May 2014.
-
(2014)
IEEE Trans. on Wireless Commun.
, vol.13
, pp. 2931-2943
-
-
Geraci, G.1
Singh, S.2
Andrews, J.G.3
Yuan, J.4
Collings, I.B.5
-
16
-
-
84906228732
-
On transmission secrecy outage of a multi-antenna system with randomly located eavesdroppers
-
Aug.
-
T. X. Zheng, H. M. Wang, and Q. Yin, "On transmission secrecy outage of a multi-antenna system with randomly located eavesdroppers, " IEEE Commun. Lett., vol. 18, pp. 1299-1302, Aug. 2014.
-
(2014)
IEEE Commun. Lett.
, vol.18
, pp. 1299-1302
-
-
Zheng, T.X.1
Wang, H.M.2
Yin, Q.3
-
17
-
-
80051955278
-
Physical-layer secrecy of MIMO communications in the presence of a poisson random field of eavesdroppers
-
June
-
M. Ghogho and A. Swami, "Physical-layer secrecy of MIMO communications in the presence of a poisson random field of eavesdroppers, " in Communications Workshops (ICC), 2011 IEEE International Conference on, pp. 1-5, June 2011.
-
(2011)
Communications Workshops (ICC), 2011 IEEE International Conference on
, pp. 1-5
-
-
Ghogho, M.1
Swami, A.2
-
18
-
-
84960156001
-
Multiantenna transmission with artificial noise against randomly distributed eavesdroppers
-
Nov.
-
T. X. Zheng, H. M. Wang, J. Yuan, D. Towsley, and M. H. Lee, "Multiantenna transmission with artificial noise against randomly distributed eavesdroppers, " IEEE Trans. on Commun., vol. 63, pp. 4347-4362, Nov. 2015.
-
(2015)
IEEE Trans. on Commun.
, vol.63
, pp. 4347-4362
-
-
Zheng, T.X.1
Wang, H.M.2
Yuan, J.3
Towsley, D.4
Lee, M.H.5
-
19
-
-
84896850363
-
Applications of self-interference cancellation in 5G and beyond
-
Feb.
-
S. Hong, J. Brand, J. Choi, M. Jain, J. Mehlman, S. Katti, and P. Levis, "Applications of self-interference cancellation in 5G and beyond, " IEEE Commun. Magazine, vol. 52, no. 2, pp. 114-121, Feb. 2014.
-
(2014)
IEEE Commun. Magazine
, vol.52
, Issue.2
, pp. 114-121
-
-
Hong, S.1
Brand, J.2
Choi, J.3
Jain, M.4
Mehlman, J.5
Katti, S.6
Levis, P.7
-
20
-
-
84887058800
-
Enhancing secrecy with multiantenna transmission in wireless ad hoc networks
-
Nov.
-
X. Zhang, X. Zhou, and M. R. McKay, "Enhancing secrecy with multiantenna transmission in wireless ad hoc networks, " IEEE Transactions on Information Forensics and Security, vol. 8, pp. 1802-1814, Nov. 2013.
-
(2013)
IEEE Transactions on Information Forensics and Security
, vol.8
, pp. 1802-1814
-
-
Zhang, X.1
Zhou, X.2
McKay, M.R.3
-
21
-
-
84929327918
-
Uncoordinated jammer selection for securing SIMOME wiretap channels: A stochastic geometry approach
-
May
-
C. Wang, H. M. Wang, X. G. Xia, and C. Liu, "Uncoordinated jammer selection for securing SIMOME wiretap channels: A stochastic geometry approach, " IEEE Transactions on Wireless Communications, vol. 14, pp. 2596-2612, May 2015.
-
(2015)
IEEE Transactions on Wireless Communications
, vol.14
, pp. 2596-2612
-
-
Wang, C.1
Wang, H.M.2
Xia, X.G.3
Liu, C.4
-
22
-
-
84879203277
-
On the design of artificialnoise-aided secure multi-antenna transmission in slow fading channels
-
June
-
X. Zhang, X. Zhou, and M. R. McKay, "On the design of artificialnoise-aided secure multi-antenna transmission in slow fading channels, " IEEE Transactions on Vehicular Technology, vol. 62, pp. 2170-2181, June 2013.
-
(2013)
IEEE Transactions on Vehicular Technology
, vol.62
, pp. 2170-2181
-
-
Zhang, X.1
Zhou, X.2
McKay, M.R.3
-
23
-
-
84855923041
-
Secure communication in stochastic wireless networks-part I: Connectivity
-
Feb.
-
P. C. Pinto, J. Barros, and M. Z. Win, "Secure communication in stochastic wireless networks-part I: Connectivity, " IEEE Trans. Inf. Forensics and Security, vol. 7, pp. 125-138, Feb. 2012.
-
(2012)
IEEE Trans. Inf. Forensics and Security
, vol.7
, pp. 125-138
-
-
Pinto, P.C.1
Barros, J.2
Win, M.Z.3
-
24
-
-
0003498504
-
-
Elsevier Academic Press, 7th ed.
-
I. S. Gradshteyn and I. M. Ryzhik, "Table of integrals, series, and products, " Elsevier Academic Press, 7th ed. 2007.
-
(2007)
Table of Integrals, Series, and Products
-
-
Gradshteyn, I.S.1
Ryzhik, I.M.2
-
25
-
-
84930677102
-
5G cellular: Key enabling technologies and research challenges
-
June
-
E. Hossain and M. Hasan, "5G cellular: key enabling technologies and research challenges, " IEEE Instrumentation Measurement Magazine, vol. 18, pp. 11-21, June 2015.
-
(2015)
IEEE Instrumentation Measurement Magazine
, vol.18
, pp. 11-21
-
-
Hossain, E.1
Hasan, M.2
|