Secure node packing of large-scale wireless networks
暂无分享,去创建一个
[1] Martin E. Hellman,et al. A note on Wyner's wiretap channel (Corresp.) , 1977, IEEE Trans. Inf. Theory.
[2] Martin Haenggi. The secrecy graph and some of its properties , 2008, 2008 IEEE International Symposium on Information Theory.
[3] Can Emre Koksal,et al. On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Trans. Inf. Theory.
[4] François Baccelli,et al. An Aloha protocol for multihop mobile wireless networks , 2006, IEEE Transactions on Information Theory.
[5] Moe Z. Win,et al. Communication in a Poisson Field of Interferers--Part I: Interference Distribution and Error Probability , 2010, IEEE Transactions on Wireless Communications.
[6] John Orriss,et al. Probability distributions for the number of radio transceivers which can communicate with one another , 2003, IEEE Trans. Commun..
[7] Jeffrey G. Andrews,et al. A primer on spatial modeling and analysis in wireless networks , 2010, IEEE Communications Magazine.
[8] Moe Z. Win,et al. A stochastic geometry approach to coexistence in heterogeneous wireless networks , 2009, IEEE Journal on Selected Areas in Communications.
[9] Alberto Zanella,et al. Interference Analysis in a Poisson Field of Nodes of Finite Area , 2009, IEEE Transactions on Vehicular Technology.
[10] Moe Z. Win,et al. A Mathematical Theory of Network Interference and Its Applications , 2009, Proceedings of the IEEE.
[11] D. Stoyan,et al. Stochastic Geometry and Its Applications , 1989 .
[12] Moe Z. Win,et al. Communication in a Poisson Field of Interferers-Part II: Channel Capacity and Interference Spectrum , 2010, IEEE Transactions on Wireless Communications.
[13] Hyundong Shin,et al. Cognitive Network Interference , 2011, IEEE Journal on Selected Areas in Communications.
[14] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[15] Moe Z. Win,et al. Secure Communication in Stochastic Wireless Networks—Part II: Maximum Rate and Collusion , 2012, IEEE Transactions on Information Forensics and Security.
[16] Moe Z. Win,et al. Secure Communication in Stochastic Wireless Networks—Part I: Connectivity , 2012, IEEE Transactions on Information Forensics and Security.
[17] Jeffrey G. Andrews,et al. On the Throughput Cost of Physical Layer Security in Decentralized Wireless Networks , 2010, IEEE Transactions on Wireless Communications.
[18] Jeffrey G. Andrews,et al. Spectrum-Sharing Transmission Capacity , 2011, IEEE Transactions on Wireless Communications.
[19] M. Haenggi,et al. Interference in Large Wireless Networks , 2009, Found. Trends Netw..