Improving Secrecy Rate via Spectrum Leasing for Friendly Jamming
暂无分享,去创建一个
[1] Aylin Yener,et al. Providing Secrecy With Structured Codes: Tools and Applications to Two-User Gaussian Channels , 2009, ArXiv.
[2] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[3] Aylin Yener,et al. Two-Hop Secure Communication Using an Untrusted Relay , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[4] Umberto Spagnolini,et al. Spectrum Leasing to Cooperating Secondary Ad Hoc Networks , 2008, IEEE Journal on Selected Areas in Communications.
[5] Zhu Han,et al. Improved Wireless Secrecy Rate Using Distributed Auction Theory , 2009, 2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks.
[6] Hesham El Gamal,et al. The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.
[7] Ariel Rubinstein,et al. A Course in Game Theory , 1995 .
[8] Sergio Barbarossa,et al. Optimal Linear Precoding Strategies for Wideband Noncooperative Systems Based on Game Theory—Part I: Nash Equilibria , 2007, IEEE Transactions on Signal Processing.
[9] Gerhard Kramer,et al. A New Outer Bound and the Noisy-Interference Sum–Rate Capacity for Gaussian Interference Channels , 2007, IEEE Transactions on Information Theory.
[10] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[11] Ender Tekin,et al. The Gaussian multiple access wire-tap channel: wireless secrecy and cooperative jamming , 2007, 2007 Information Theory and Applications Workshop.
[12] H. Vincent Poor,et al. Multiple-Access Channels With Confidential Messages , 2008, IEEE Transactions on Information Theory.
[13] K. J. Ray Liu,et al. Repeated open spectrum sharing game with cheat-proof strategies , 2009, IEEE Transactions on Wireless Communications.
[14] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[15] James O'Daniell Neel,et al. Analysis and Design of Cognitive Radio Networks and Distributed Radio Resource Management Algorithms , 2006 .
[16] P. Klemperer. Auction Theory: A Guide to the Literature , 1999 .
[17] Merouane Debbah,et al. Improved Wireless Secrecy Capacity using Distributed Auction Theory , 2009 .
[18] H. Vincent Poor,et al. Interference Assisted Secret Communication , 2008, IEEE Transactions on Information Theory.
[19] Ender Tekin,et al. Achievable Rates for the General Gaussian Multiple Access Wire-Tap Channel with Collective Secrecy , 2006, ArXiv.
[20] Eytan Modiano,et al. Wireless channel allocation using an auction algorithm , 2006, IEEE Journal on Selected Areas in Communications.
[21] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[22] Sennur Ulukus,et al. Secrecy in Cooperative Relay Broadcast Channels , 2008, IEEE Transactions on Information Theory.
[23] K. J. Ray Liu,et al. An Information Secrecy Game in Cognitive Radio Networks , 2011, IEEE Transactions on Information Forensics and Security.
[24] Avraham Adler,et al. Lambert-W Function , 2015 .
[25] Aylin Yener,et al. Cooperative jamming via spectrum leasing , 2011, 2011 International Symposium of Modeling and Optimization of Mobile, Ad Hoc, and Wireless Networks.
[26] Te Sun Han,et al. A new achievable rate region for the interference channel , 1981, IEEE Trans. Inf. Theory.
[27] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[28] William Vickrey,et al. Counterspeculation, Auctions, And Competitive Sealed Tenders , 1961 .
[29] Venugopal V. Veeravalli,et al. Gaussian Interference Networks: Sum Capacity in the Low-Interference Regime and New Outer Bounds on the Capacity Region , 2008, IEEE Transactions on Information Theory.
[30] Aylin Yener,et al. Recruiting multi-antenna transmitters as cooperative jammers: An auction-theoretic approach , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[31] Zhu Han,et al. Physical Layer Security Game: Interaction between Source, Eavesdropper, and Friendly Jammer , 2009, EURASIP J. Wirel. Commun. Netw..
[32] Sergio Barbarossa,et al. Optimal Linear Precoding Strategies for Wideband Non-Cooperative Systems Based on Game Theory—Part II: Algorithms , 2007, IEEE Transactions on Signal Processing.
[33] Tuomas Sandholm,et al. Issues in Computational Vickrey Auctions , 2000, Int. J. Electron. Commer..
[34] Abhay Parekh,et al. Spectrum sharing for unlicensed bands , 2005, IEEE Journal on Selected Areas in Communications.
[35] Roy D. Yates,et al. The Discrete Memoryless Multiple Access Channel with Confidential Messages , 2006, 2006 IEEE International Symposium on Information Theory.
[36] Umberto Spagnolini,et al. Cooperative ARQ via auction-based spectrum leasing , 2010, IEEE Transactions on Communications.