-
1
-
-
84959499960
-
Wireless physical-layer security: Lessons learned from information theory
-
Sep
-
A. Yenner and S. Ulukus, "Wireless physical-layer security: lessons learned from information theory," Proc. IEEE, vol. 103, no. 10, pp. 1814-1825, Sep. 2015.
-
(2015)
Proc. IEEE
, vol.103
, Issue.10
, pp. 1814-1825
-
-
Yenner, A.1
Ulukus, S.2
-
2
-
-
85020456786
-
A survey on multiple-antenna techniques for physical layer security
-
X. Chen, D. W. K. Ng, W. Gerstacker, and H-H. Chen, "A survey on multiple-antenna techniques for physical layer security," IEEE Commun. Surveys Tuts., doi: 10.1109/COMST.2016.2633387.
-
IEEE Commun. Surveys Tuts
-
-
Chen, X.1
Ng, D.W.K.2
Gerstacker, W.3
Chen, H.-H.4
-
3
-
-
84938932265
-
Coding for relay channels with confidential messages
-
Y. Oohama, "Coding for relay channels with confidential messages," in Proc. Inf. Theory Workshop, 2001, pp. 87-89.
-
(2001)
Proc. Inf. Theory Workshop
, pp. 87-89
-
-
Oohama, Y.1
-
4
-
-
80051752373
-
Two-hop secure communication using an untrusted relay: A case for cooperative jamming
-
New Orleans, LA, Dec
-
X. He and A. Yener, "Two-hop secure communication using an untrusted relay: A case for cooperative jamming," in Proc. IEEE Globecom, New Orleans, LA, Dec. 2008, pp. 1-5.
-
(2008)
Proc. IEEE Globecom
, pp. 1-5
-
-
He, X.1
Yener, A.2
-
5
-
-
84867800602
-
Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes
-
Oct
-
L. Sun, T. Zhang, Y. Li, and H. Niu, "Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes," IEEE Trans. Veh. Technol., vol. 61, no. 8, pp. 3801-3807, Oct. 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.8
, pp. 3801-3807
-
-
Sun, L.1
Zhang, T.2
Li, Y.3
Niu, H.4
-
6
-
-
84969546646
-
Optimal power allocation to improve secrecy performance of non-regenerative cooperative systems using an untrusted relay
-
May
-
A. Kuhestani, A. Mohammadi and M. Noori, "Optimal power allocation to improve secrecy performance of non-regenerative cooperative systems using an untrusted relay," IET Commun., vol. 10, no. 8, pp. 962-968, May 2016.
-
(2016)
IET Commun.
, vol.10
, Issue.8
, pp. 962-968
-
-
Kuhestani, A.1
Mohammadi, A.2
Noori, M.3
-
7
-
-
84961675624
-
Joint optimal power allocation and relay selection to establish secure transmission in uplink transmission of untrusted relays network
-
Mar
-
A. Kuhestani, A. Mohammadi, and M. Masoudi, "Joint optimal power allocation and relay selection to establish secure transmission in uplink transmission of untrusted relays network", IET Network., vol. 5, no. 2, pp. 30-36, Mar. 2016.
-
(2016)
IET Network.
, vol.5
, Issue.2
, pp. 30-36
-
-
Kuhestani, A.1
Mohammadi, A.2
Masoudi, M.3
-
8
-
-
84867799883
-
Physical layer security for two-way untrusted relaying with friendly jammers
-
Oct
-
R. Zhang, L. Song, Z. Han, and B. Jiao, "Physical layer security for two-way untrusted relaying with friendly jammers," IEEE Trans. Veh. Technol., vol. 61, no. 8, pp. 3693-3704, Oct. 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.8
, pp. 3693-3704
-
-
Zhang, R.1
Song, L.2
Han, Z.3
Jiao, B.4
-
9
-
-
84901257838
-
Joint transmit design and node selection for one-way and two-way untrusted relay channels
-
Nov
-
J. Huang, A. L. Swindlehurst, "Joint transmit design and node selection for one-way and two-way untrusted relay channels," Asilomar Conference on Signals, Systems and Computers, pp. 1555-1559, Nov. 2013.
-
(2013)
Asilomar Conference on Signals, Systems and Computers
, pp. 1555-1559
-
-
Huang, J.1
Swindlehurst, A.L.2
-
10
-
-
84898039745
-
Secure beamforming for MIMO two-way communications with an untrusted relay
-
May
-
J. Mo, M. Tao, Y. Liu, and R. Wang, "Secure beamforming for MIMO two-way communications with an untrusted relay," IEEE Trans. Signal Process., vol. 62, no. 9, May 2014.
-
(2014)
IEEE Trans. Signal Process.
, vol.62
, Issue.9
-
-
Mo, J.1
Tao, M.2
Liu, Y.3
Wang, R.4
-
11
-
-
85009956145
-
Ergodic sum rate analysis and efficient power allocation for a massive MIMO two-way relay network
-
Jan
-
K. P. Roshandeh, A. Kuhestani, M. Ardakani, and C. Tellambura, "Ergodic sum rate analysis and efficient power allocation for a massive MIMO two-way relay network," IET Commun., vol. 11, no. 2, pp. 211-217, Jan. 2017.
-
(2017)
IET Commun.
, vol.11
, Issue.2
, pp. 211-217
-
-
Roshandeh, K.P.1
Kuhestani, A.2
Ardakani, M.3
Tellambura, C.4
-
12
-
-
29144455916
-
High-SNR power offset in multiantenna communication
-
Dec
-
A. Lozano, A. Tulino, and S. Verdu, "High-SNR power offset in multiantenna communication," IEEE Trans. Inf. Theory, vol. 51, no. 12, pp. 4134-4151, Dec. 2005.
-
(2005)
IEEE Trans. Inf. Theory
, vol.51
, Issue.12
, pp. 4134-4151
-
-
Lozano, A.1
Tulino, A.2
Verdu, S.3
-
14
-
-
84919781032
-
Random matrix theory and wireless communications
-
Jun
-
A. M. Tulino and S. Verdu, "Random matrix theory and wireless communications," Foundations and Trends in Communications and Information Theory, vol. 1, no. 1, pp. 1-182, Jun. 2004.
-
(2004)
Foundations and Trends in Communications and Information Theory
, vol.1
, Issue.1
, pp. 1-182
-
-
Tulino, A.M.1
Verdu, S.2
-
15
-
-
84881085687
-
An accurate approximation of the exponential integral function using a sum of exponentials
-
Jul
-
A. Alkheir and M. Ibnkahla, "An accurate approximation of the exponential integral function using a sum of exponentials," IEEE Commun. Lett., vol. 17, no. 7, pp. 1364-1367, Jul. 2013.
-
(2013)
IEEE Commun. Lett.
, vol.17
, Issue.7
, pp. 1364-1367
-
-
Alkheir, A.1
Ibnkahla, M.2
|