Improving security in two-way relay networks by optimal relay and jammer selection
暂无分享,去创建一个
[1] Armin Wittneben,et al. Spectral efficient protocols for half-duplex fading relay channels , 2007, IEEE Journal on Selected Areas in Communications.
[2] H. Vincent Poor,et al. Generalized Multiple Access Channels with Confidential Messages , 2006, 2006 IEEE International Symposium on Information Theory.
[3] John S. Thompson,et al. Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.
[4] Armin Wittneben,et al. Achievable Rate Regions for the Two-way Relay Channel , 2006, 2006 IEEE International Symposium on Information Theory.
[5] Zhu Han,et al. Amplify-and-forward based cooperation for secure wireless communications , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[6] Zhu Han,et al. Secure wireless communications via cooperation , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[7] Tracey Ho,et al. Memoryless relay strategies for two-way relay channels , 2009, IEEE Transactions on Communications.
[8] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2007, ISIT.
[9] Miguel R. D. Rodrigues,et al. Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.
[10] Shlomo Shamai,et al. Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.
[11] Imre Csiszár,et al. Secrecy capacities for multiterminal channel models , 2005, ISIT.
[12] Yindi Jing,et al. A relay selection scheme for two-way amplify-and-forward relay networks , 2009, 2009 International Conference on Wireless Communications & Signal Processing.
[13] Joachim Hagenauer,et al. Iterative Network and Channel Decoding for the Two-Way Relay Channel , 2006, 2006 IEEE International Conference on Communications.
[14] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[15] Imre Csiszár,et al. Secrecy Capacities for Multiterminal Channel Models , 2005, IEEE Transactions on Information Theory.
[16] H. Vincent Poor,et al. Multiple-Access Channels With Confidential Messages , 2008, IEEE Transactions on Information Theory.
[17] Xiang He,et al. On the role of feedback in two-way secure communication , 2008, 2008 42nd Asilomar Conference on Signals, Systems and Computers.
[18] Gregory W. Wornell,et al. Secure Broadcasting Over Fading Channels , 2008, IEEE Transactions on Information Theory.
[19] Michele Nogueira Lima,et al. Identity-based key management in mobile ad hoc networks: techniques and applications , 2008, IEEE Wireless Communications.