Implementing Physical Layer Security Using Transmitters with Constellation Shaping
暂无分享,去创建一个
[1] David Tse,et al. Fundamentals of Wireless Communication , 2005 .
[2] Mário Marques da Silva,et al. MIMO Processing for 4G and Beyond: Fundamentals and Evolution , 2014 .
[3] Candice King,et al. Fundamentals of wireless communications , 2013, 2014 67th Annual Conference for Protective Relay Engineers.
[4] Paulo Montezuma,et al. Design of TC-OQAM schemes using a generalised nonlinear OQPSK-type format , 1999 .
[5] Matthieu R. Bloch,et al. Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security , 2013, IEEE Signal Processing Magazine.
[6] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[7] Bruce Schneier,et al. Cryptographic Design Vulnerabilities , 1998, Computer.
[8] F. Amoroso,et al. Simplified MSK Signaling Technique , 1977, IEEE Trans. Commun..
[9] Paulo Montezuma,et al. Iterative Frequency-Domain Equalization for general constellations , 2010, 2010 IEEE Sarnoff Symposium.
[10] J. L. Massey,et al. An introduction to contemporary cryptology , 1988, Proc. IEEE.
[11] Marko Beko,et al. Robust Frequency-Domain Receivers for a Transmission Technique with Directivity at the Constellation Level , 2014, 2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall).
[12] Alessandro Barenghi,et al. Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures , 2012, Proceedings of the IEEE.
[13] Marko Beko,et al. On the Use of Multiple Grossly Nonlinear Amplifiers for Highly Efficient Linear Amplification of Multilevel Constellations , 2013, 2013 IEEE 78th Vehicular Technology Conference (VTC Fall).