Physical Layer Security With Uncertainty on the Location of the Eavesdropper
暂无分享,去创建一个
[1] Shihao Yan,et al. Location-Based Beamforming for Enhancing Secrecy in Rician Wiretap Channels , 2016, IEEE Transactions on Wireless Communications.
[2] Xiangyun Zhou,et al. On the physical layer security in large scale cellular networks , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).
[3] Ananthram Swami,et al. Characterizing physical-layer secrecy with unknown eavesdropper locations and channels , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[4] Sennur Ulukus,et al. Wireless Physical-Layer Security: Lessons Learned From Information Theory , 2015, Proceedings of the IEEE.
[5] Irene A. Stegun,et al. Handbook of Mathematical Functions. , 1966 .
[6] George K. Karagiannidis,et al. How Much Does I/Q Imbalance Affect Secrecy Capacity? , 2016, IEEE Communications Letters.
[7] Pingzhi Fan,et al. On the Performance of Non-Orthogonal Multiple Access in 5G Systems with Randomly Deployed Users , 2014, IEEE Signal Processing Letters.
[8] Miguel R. D. Rodrigues,et al. Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.
[9] Moe Z. Win,et al. Wireless physical-layer security: The case of colluding eavesdroppers , 2009, 2009 IEEE International Symposium on Information Theory.
[10] Chenxi Liu,et al. Location-Based Beamforming and Physical Layer Security in Rician Wiretap Channels , 2016, IEEE Transactions on Wireless Communications.
[11] Trung Q. Duong,et al. Physical layer secrecy performance over Rayleigh/Rician fading channels , 2014, 2014 International Conference on Advanced Technologies for Communications (ATC 2014).
[12] Tho Le-Ngoc,et al. Physical layer security in wireless cooperative relay networks: state of the art and beyond , 2015, IEEE Communications Magazine.
[13] A. Robert Calderbank,et al. Modeling location uncertainty for eavesdroppers: A secrecy graph approach , 2010, 2010 IEEE International Symposium on Information Theory.
[14] Joseph Lipka,et al. A Table of Integrals , 2010 .
[15] Xiangyun Zhou,et al. Physical Layer Security in Cellular Networks: A Stochastic Geometry Approach , 2013, IEEE Transactions on Wireless Communications.
[16] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[17] Jinhong Yuan,et al. Location-Based Secure Transmission for Wiretap Channels , 2015, IEEE Journal on Selected Areas in Communications.