Secrecy Rate Maximization With Outage Constraint in Multihop Relaying Networks
暂无分享,去创建一个
[1] Can Emre Koksal,et al. On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Trans. Inf. Theory.
[2] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[3] Yueming Cai,et al. Secure Connectivity Using Randomize-and-Forward Strategy in Cooperative Wireless Networks , 2013, IEEE Communications Letters.
[4] Dimitri P. Bertsekas,et al. Data Networks , 1986 .
[5] Matthew R. McKay,et al. Rethinking the Secrecy Outage Formulation: A Secure Transmission Design Perspective , 2011, IEEE Communications Letters.
[6] Naofal Al-Dhahir,et al. Enhancing the PHY-Layer Security of MIMO Buffer-Aided Relay Networks , 2016, IEEE Wireless Communications Letters.
[7] Naofal Al-Dhahir,et al. Physical-Layer Security of a Buffer-Aided Full-Duplex Relaying System , 2016, IEEE Communications Letters.
[8] Jong-Ho Lee,et al. Full-Duplex Relay for Enhancing Physical Layer Security in Multi-Hop Relaying Systems , 2015, IEEE Communications Letters.
[9] Xiangyun Zhou,et al. Secure Routing in Multihop Wireless Ad-Hoc Networks With Decode-and-Forward Relaying , 2016, IEEE Transactions on Communications.
[10] Ariel Orda,et al. Minimum Energy Routing and Jamming to Thwart Wireless Network Eavesdroppers , 2015, IEEE Transactions on Mobile Computing.
[11] Dennis Goeckel,et al. Energy-Efficient Routing in Wireless Networks in the Presence of Jamming , 2016, IEEE Transactions on Wireless Communications.
[12] T. Mattfeldt. Stochastic Geometry and Its Applications , 1996 .
[13] Xiangyun Zhou,et al. When Does Relay Transmission Give a More Secure Connection in Wireless Ad Hoc Networks? , 2014, IEEE Transactions on Information Forensics and Security.
[14] Xianbin Wang,et al. Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.
[15] Meng Zhang,et al. Artificial Noise Aided Secrecy Information and Power Transfer in OFDMA Systems , 2016, IEEE Transactions on Wireless Communications.
[16] Suili Feng,et al. Secure Routing in Full-Duplex Jamming Multihop Relaying , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[17] Meixia Tao,et al. Relay Placement for Physical Layer Security: A Secure Connection Perspective , 2012, IEEE Communications Letters.
[18] Feng Liu,et al. Outage Constrained Secrecy Throughput Maximization for DF Relay Networks , 2015, IEEE Transactions on Communications.
[19] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[20] Meng Zhang,et al. Energy Harvesting for Physical-Layer Security in OFDMA Networks , 2015, IEEE Transactions on Information Forensics and Security.
[21] Onur Ozan Koyluoglu,et al. On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Transactions on Information Theory.
[22] Aylin Yener,et al. End-to-End Secure Multi-Hop Communication with Untrusted Relays , 2008, IEEE Transactions on Wireless Communications.