ALLOCATION OF POWER IN RELAY NETWORKS FOR SECURED COMMUNICATION
暂无分享,去创建一个
[1] Taha Abdelshafy,et al. OPTIMAL DECODING FOR WIRELESS RELAY NETWORKS WITH DECODE-AND-FORWARD COOPERATION PROTOCOL , 2014 .
[2] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[3] Mounir Ghogho,et al. Outage Probability Based Power Distribution Between Data and Artificial Noise for Physical Layer Security , 2012, IEEE Signal Processing Letters.
[4] Mustafa Cenk Gursoy,et al. Collaborative Relay Beamforming for Secrecy , 2010, 2010 IEEE International Conference on Communications.
[5] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[6] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[7] Pimal Khanpara. A REVIEW ON FUZZY LOGIC BASED ROUTING IN AD HOC NETWORKS , 2014 .
[8] Chong-Yung Chi,et al. QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach , 2011, IEEE Transactions on Signal Processing.
[9] Osvaldo Simeone,et al. Secure Communications via Cooperating Base Stations , 2008, IEEE Communications Letters.
[10] A. Lee Swindlehurst,et al. Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.
[11] Björn E. Ottersten,et al. Collaborative-Relay Beamforming With Perfect CSI: Optimum and Distributed Implementation , 2009, IEEE Signal Processing Letters.
[12] Zhu Han,et al. Secure wireless communications via cooperation , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[13] Il-Min Kim,et al. Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.
[14] Kin K. Leung,et al. Multi-user diversity for secrecy in wireless networks , 2010, 2010 Information Theory and Applications Workshop (ITA).
[15] Steven P. Weber,et al. On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.
[16] Kin K. Leung,et al. On the Application of Cooperative Transmission to Secrecy Communications , 2012, IEEE Journal on Selected Areas in Communications.