Boundaries as an Enhancement Technique for Physical Layer Security
暂无分享,去创建一个
[1] Imran Shafique Ansari,et al. Secrecy Outage Performance of Transmit Antenna Selection for MIMO Underlay Cognitive Radio Systems Over Nakagami- $m$ Channels , 2017, IEEE Transactions on Vehicular Technology.
[2] Carl P. Dettmann,et al. Temporal Correlation of Interference in Bounded Mobile Ad Hoc Networks With Blockage , 2016, IEEE Communications Letters.
[3] Halim Yanikomeroglu,et al. A Simple Approximation of the Aggregate Interference From a Cluster of Many Interferers With Correlated Shadowing , 2014, IEEE Transactions on Wireless Communications.
[4] S. Srinivasa. MODELING INTERFERENCE IN FINITE UNIFORMLY RANDOM NETWORKS , 2007 .
[5] Carl P. Dettmann,et al. Distribution of Cell Area in Bounded Poisson Voronoi Tessellations with Application to Secure Local Connectivity , 2016, Journal of Statistical Physics.
[6] H. Saunders,et al. Probability, Random Variables and Stochastic Processes (2nd Edition) , 1989 .
[7] Matthew R. McKay,et al. Enhancing Secrecy With Multi-Antenna Transmission in Wireless Ad Hoc Networks , 2013, IEEE Transactions on Information Forensics and Security.
[8] Mohamed-Slim Alouini,et al. An Overview of Physical Layer Security in Wireless Communication Systems With CSIT Uncertainty , 2016, IEEE Access.
[9] Harpreet S. Dhillon,et al. Stochastic Geometry-Based Comparison of Secrecy Enhancement Techniques in D2D Networks , 2017, IEEE Wireless Communications Letters.
[10] I. Miller. Probability, Random Variables, and Stochastic Processes , 1966 .
[11] Matthew C. Valenti,et al. The Outage Probability of a Finite Ad Hoc Network in Nakagami Fading , 2012, IEEE Transactions on Communications.
[12] Salman Durrani,et al. Outage Probability in Arbitrarily-Shaped Finite Wireless Networks , 2013, IEEE Transactions on Communications.
[13] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[14] Martin Haenggi,et al. Spatial and temporal correlation of the interference in ALOHA ad hoc networks , 2009, IEEE Communications Letters.
[15] Mohamed-Slim Alouini,et al. The Effect of Spatial Interference Correlation and Jamming on Secrecy in Cellular Networks , 2017, IEEE Wireless Communications Letters.
[16] Huiming Wang,et al. Secure MISO Wiretap Channels With Multiantenna Passive Eavesdropper: Artificial Noise vs. Artificial Fast Fading , 2015, IEEE Transactions on Wireless Communications.
[17] Donald F. Towsley,et al. Physical Layer Security in Heterogeneous Cellular Networks , 2016, IEEE Transactions on Communications.
[18] Justin P. Coon,et al. More is less: Connectivity in fractal regions , 2014, 2015 International Symposium on Wireless Communication Systems (ISWCS).
[19] Carl P. Dettmann,et al. Temporal Correlation of Interference and Outage in Mobile Networks over One-Dimensional Finite Regions , 2016, IEEE Transactions on Mobile Computing.
[20] Wade Trappe,et al. The challenges facing physical layer security , 2015, IEEE Communications Magazine.
[21] Matthew R. McKay,et al. Rethinking the Secrecy Outage Formulation: A Secure Transmission Design Perspective , 2011, IEEE Communications Letters.
[22] Martin Haenggi,et al. Interference and Outage in Mobile Random Networks: Expectation, Distribution, and Correlation , 2014, IEEE Transactions on Mobile Computing.
[23] Jeffrey G. Andrews,et al. A general approach to SINR-based performance metrics with application to D2D and carrier aggregation , 2013, 2013 Asilomar Conference on Signals, Systems and Computers.
[24] John G. Proakis,et al. Probability, random variables and stochastic processes , 1985, IEEE Trans. Acoust. Speech Signal Process..
[25] Milton Abramowitz,et al. Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables , 1964 .
[26] Alberto Zanella,et al. Interference Analysis in a Poisson Field of Nodes of Finite Area , 2009, IEEE Transactions on Vehicular Technology.
[27] Tong-Xing Zheng,et al. Physical Layer Security in Random Cellular Networks , 2016, SpringerBriefs in Computer Science.
[28] Donald F. Towsley,et al. Multi-Antenna Transmission With Artificial Noise Against Randomly Distributed Eavesdroppers , 2015, IEEE Transactions on Communications.
[29] Nei Kato,et al. On Physical Layer Security in Finite-Area Wireless Networks: An Analysis Framework , 2017, 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall).
[30] Raviraj S. Adve,et al. Analyzing the Impact of Access Point Density on the Performance of Finite-Area Networks , 2015, IEEE Transactions on Communications.
[31] Lifeng Wang,et al. Physical Layer Security of Maximal Ratio Combining in Two-Wave With Diffuse Power Fading Channels , 2014, IEEE Transactions on Information Forensics and Security.
[32] Tareq Y. Al-Naffouri,et al. Enhancing Secrecy With Multiantenna Transmission in Millimeter Wave Vehicular Communication Systems , 2016, IEEE Transactions on Vehicular Technology.
[33] Jeffrey G. Andrews,et al. Secure Wireless Network Connectivity with Multi-Antenna Transmission , 2011, IEEE Transactions on Wireless Communications.
[34] Tharmalingam Ratnarajah,et al. An Analysis on Secure Communication in Millimeter/Micro-Wave Hybrid Networks , 2016, IEEE Transactions on Communications.
[35] Robert W. Heath,et al. Device-to-Device Millimeter Wave Communications: Interference, Coverage, Rate, and Finite Topologies , 2015, IEEE Transactions on Wireless Communications.
[36] M. Abramowitz,et al. Handbook of Mathematical Functions With Formulas, Graphs and Mathematical Tables (National Bureau of Standards Applied Mathematics Series No. 55) , 1965 .
[37] Jeffrey G. Andrews,et al. A Tractable Approach to Coverage and Rate in Cellular Networks , 2010, IEEE Transactions on Communications.
[38] Moe Z. Win,et al. Secure Communication in Stochastic Wireless Networks—Part I: Connectivity , 2012, IEEE Transactions on Information Forensics and Security.
[39] Salman Durrani,et al. Device-to-Device Communication Underlaying a Finite Cellular Network Region , 2015, IEEE Transactions on Wireless Communications.
[40] Martin Haenggi. The secrecy graph and some of its properties , 2008, 2008 IEEE International Symposium on Information Theory.
[41] Jeffrey G. Andrews,et al. On the Throughput Cost of Physical Layer Security in Decentralized Wireless Networks , 2010, IEEE Transactions on Wireless Communications.
[42] Moe Z. Win,et al. Secure Communication in Stochastic Wireless Networks , 2010, ArXiv.
[43] Justin P. Coon,et al. Full Connectivity: Corners, Edges and Faces , 2012, ArXiv.
[44] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[45] Victor C. M. Leung,et al. Improving physical-layer security in wireless communications using diversity techniques , 2014, IEEE Network.
[46] Ranjan K. Mallik,et al. Physical Layer Security in Three-Tier Wireless Sensor Networks: A Stochastic Geometry Approach , 2016, IEEE Transactions on Information Forensics and Security.
[47] Zhu Han,et al. Physical Layer Security in Wireless Ad Hoc Networks Under A Hybrid Full-/Half-Duplex Receiver Deployment Strategy , 2017, IEEE Transactions on Wireless Communications.
[48] Kalle Ruttik,et al. Computation of Aggregate Interference from Multiple Secondary Transmitters , 2011, IEEE Communications Letters.
[49] Xiangyun Zhou,et al. Wireless Physical Layer Security with Imperfect Channel State Information: A Survey , 2013, ArXiv.
[50] Moe Z. Win,et al. Continuum percolation in the intrinsically secure communications graph , 2010, 2010 International Symposium On Information Theory & Its Applications.