The role of aggregate interference on intrinsic network secrecy
暂无分享,去创建一个
[1] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[2] John Orriss,et al. Probability distributions for the number of radio transceivers which can communicate with one another , 2003, IEEE Trans. Commun..
[3] Moe Z. Win,et al. Intentional Network Interference for Denial of Wireless Eavesdropping , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[4] Richard E. Blahut,et al. Secrecy capacity of SIMO and slow fading channels , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..
[5] Andrea Conti,et al. Mathematical Evaluation of Environmental Monitoring Estimation Error through Energy-Efficient Wireless Sensor Networks , 2007, IEEE Transactions on Mobile Computing.
[6] Moe Z. Win,et al. Communication in a Poisson Field of Interferers-Part II: Channel Capacity and Interference Spectrum , 2010, IEEE Transactions on Wireless Communications.
[7] Matthew R. McKay,et al. Rethinking the Secrecy Outage Formulation: A Secure Transmission Design Perspective , 2011, IEEE Communications Letters.
[8] Hyundong Shin,et al. Cognitive Network Interference , 2011, IEEE Journal on Selected Areas in Communications.
[9] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[10] Shlomo Shamai,et al. Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.
[11] Jeffrey G. Andrews,et al. On the Throughput Cost of Physical Layer Security in Decentralized Wireless Networks , 2010, IEEE Transactions on Wireless Communications.
[12] Andrea Giorgetti,et al. Influence of fading on the Gaussian approximation for BPSK and QPSK with asynchronous cochannel interference , 2005, IEEE Transactions on Wireless Communications.
[13] Moe Z. Win,et al. A Mathematical Theory of Network Interference and Its Applications , 2009, Proceedings of the IEEE.
[14] Marco Chiani,et al. Outage evaluation for slow frequency-hopping mobile radio systems , 1999, IEEE Trans. Commun..
[15] Vishal Misra,et al. Connectivity Maintenance in Mobile Wireless Networks via Constrained Mobility , 2012, IEEE J. Sel. Areas Commun..
[16] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..