Secure Transmission Schemes for Two-Way Relay Networks
暂无分享,去创建一个
Qinye Yin | Xiaoping Li | Shaoqian Li | Wanbin Tang | Jianquan Wang | Miao Luo | Shaoqian Li | Jianquan Wang | Wanbin Tang | Xiaoping Li | Miao Luo | Qinye Yin
[1] Leandro Ronchini Ximenes. Unified Joint Symbol and Channel Estimation with Interference Subtraction for One-Way and Two-Way MIMO Relaying Systems , 2018, 2018 IEEE 10th Latin-American Conference on Communications (LATINCOM).
[2] Guanding Yu,et al. On the Secrecy Capacity of Fading Wireless Channel with Multiple Eavesdroppers , 2007, 2007 IEEE International Symposium on Information Theory.
[3] P. Shanmugapriya,et al. Improving security in two-way relay networks by optimal relay and jammer selection , 2013, 2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN).
[4] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[5] Guangyi Liu,et al. Achievability of the channel reciprocity and its benefit in TDD system , 2010, 2010 5th International ICST Conference on Communications and Networking in China.
[6] Shahram Shahbazpanahi,et al. A Semi-Closed-Form Solution to Optimal Distributed Beamforming for Two-Way Relay Networks , 2012, IEEE Transactions on Signal Processing.
[7] Tiejun Lv,et al. AN-aided robust secure beamforming design in MIMO two-way relay systems with PNC , 2018, 2018 IEEE Wireless Communications and Networking Conference (WCNC).
[8] Jianjun Wu,et al. Jammer selection for secure two-way DF relay communications with imperfect CSI , 2014, 16th International Conference on Advanced Communication Technology.
[9] Xian Liu. Outage Probability of Secrecy Capacity over Correlated Log-Normal Fading Channels , 2013, IEEE Communications Letters.
[10] Meixia Tao,et al. Secure Beamforming for MIMO Two-Way Communications With an Untrusted Relay , 2013, IEEE Transactions on Signal Processing.
[11] Ying-Chang Liang,et al. Optimal beamforming for two-way multi-antenna relay channel with analogue network coding , 2008, IEEE Journal on Selected Areas in Communications.
[12] Hyuck M. Kwon,et al. Achievable rate of a two-way relay channel with structured code under Rayleigh fading , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).
[13] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[14] Lihua Li,et al. An adaptive method utilizing channel reciprocity in TDD-LTE system , 2011 .
[15] Zhongshan Zhang,et al. Secure Full-Duplex Two-Way Relaying Networks With Optimal Relay Selection , 2017, IEEE Communications Letters.
[16] Tong-Xing Zheng,et al. Improving Anti-Eavesdropping Ability Without Eavesdropper’s CSI: A Practical Secure Transmission Design Perspective , 2018, IEEE Wireless Communications Letters.
[17] Alister G. Burr,et al. On the Maximum Achievable Sum-Rate of Interfering Two-Way Relay Channels , 2012, IEEE Communications Letters.
[18] Tharmalingam Ratnarajah,et al. Secrecy capacity and secure outage performance for rayleigh fading simo channel , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[19] Jung Hee Cheon,et al. A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption , 2015, IEEE Transactions on Information Forensics and Security.
[20] Hamid Behroozi,et al. On the Capacity Region of Asymmetric Gaussian Two-Way Line Channel , 2016, IEEE Transactions on Communications.
[21] Zhi Chen,et al. Optimal Throughput for Two-Way Relaying: Energy Harvesting and Energy Co-Operation , 2016, IEEE Journal on Selected Areas in Communications.
[22] Jie Yang,et al. Distributed Relay Selection for Two-Way Relaying Networks Based on Power Conservation , 2014, 2014 International Conference on Wireless Communication and Sensor Network.
[23] Richard E. Blahut,et al. Secrecy capacity of SIMO and slow fading channels , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..
[24] He Wang,et al. A novel half-jamming protocol for secure two-way relay systems using a full-duplex jamming relay , 2017, 2017 3rd IEEE International Conference on Computer and Communications (ICCC).
[25] Zhu Han,et al. Joint Relay and Jammer Selection for Secure Two-Way Relay Networks , 2012, IEEE Trans. Inf. Forensics Secur..
[26] Lingfeng Shen,et al. Cooperative Jamming and Relay Beamforming Design for Physical Layer Secure Two-Way Relaying , 2018, 2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC).
[27] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[28] Qiang Gao,et al. Outage performance of two-way decode-and-forward relaying over block fading channels , 2017, 2017 IEEE 9th International Conference on Communication Software and Networks (ICCSN).