Effects of CSI Knowledge on Secrecy of Threshold-Selection Decode-and-Forward Relaying
暂无分享,去创建一个
Octavia A. Dobre | Trung Q. Duong | Chinmoy Kundu | Ranjan Bose | Telex M. N. Ngatched | Sarbani Ghose | T. Duong | O. Dobre | R. Bose | T. Ngatched | C. Kundu | Sarbani Ghose
[1] K. J. Ray Liu,et al. Optimum threshold-selection relaying for decode-and-forward cooperation protocol , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..
[2] Mérouane Debbah,et al. Relay Selection Schemes for Dual-Hop Networks under Security Constraints with Multiple Eavesdroppers , 2013, IEEE Transactions on Wireless Communications.
[3] O. Olabiyi,et al. Ergodic Secrecy Rates of Secure Wireless Communications , 2014, 2014 IEEE Military Communications Conference.
[4] Miguel R. D. Rodrigues,et al. Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.
[5] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.
[6] Xianbin Wang,et al. Secrecy capacity enhancement in two-hop DF relaying systems in the presence of eavesdropper , 2015, 2015 IEEE International Conference on Communications (ICC).
[7] Saeed Vahidian,et al. Relay Selection for Security-Constrained Cooperative Communication in the Presence of Eavesdropper's Overhearing and Interference , 2015, IEEE Wireless Communications Letters.
[8] John S. Thompson,et al. Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.
[9] Esa R. Alotaibi,et al. Ergodic secrecy capacity analysis for cooperative communication with relay selection under non-identical distribution , 2016, 2016 IEEE International Conference on Communications (ICC).
[10] Ioannis Krikidis,et al. Opportunistic relay selection for cooperative networks with secrecy constraints , 2010, IET Commun..
[11] Chinmoy Kundu,et al. Secrecy performance of dual-hop decode-and-forward relay system with diversity combining at the eavesdropper , 2016, IET Commun..
[12] Octavia A. Dobre,et al. Secrecy Performance of Dual-Hop Threshold Relaying System with Diversity Reception , 2016, 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall).
[13] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[14] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[15] Chinmoy Kundu,et al. Secrecy Outage of Dual-Hop Regenerative Multi-Relay System With Relay Selection , 2015, IEEE Transactions on Wireless Communications.
[16] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[17] Caijun Zhong,et al. Opportunistic Relay Selection for Secrecy Enhancement in Cooperative Networks , 2015, IEEE Transactions on Communications.
[18] Steven P. Weber,et al. On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.
[19] H. Vincent Poor,et al. Security Enhancement of Cooperative Single Carrier Systems , 2015, IEEE Transactions on Information Forensics and Security.
[20] Pingzhi Fan,et al. Secure multiuser communications in multiple decode-and-forward relay networks with direct links , 2014, 2014 IEEE Global Communications Conference.
[21] Octavia A. Dobre,et al. Relay Selection to Improve Secrecy in Cooperative Threshold Decode-and-Forward Relaying , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[22] Nan Yang,et al. Secrecy Outage Probability of Selective Relaying Wiretap Channels with Collaborative Eavesdropping , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).
[23] Xianbin Wang,et al. Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.
[24] A. Lee Swindlehurst,et al. Secure Relay and Jammer Selection for Physical Layer Security , 2015, IEEE Signal Processing Letters.
[25] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[26] Gregory W. Wornell,et al. Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.
[27] Meixia Tao,et al. Relay Placement for Physical Layer Security: A Secure Connection Perspective , 2012, IEEE Communications Letters.
[28] Yueming Cai,et al. Average secrecy rate analysis with relay selection using decode-and-forward strategy in cooperative networks , 2013, 2013 International Conference on Wireless Communications and Signal Processing.
[29] D. G. Brennan. Linear Diversity Combining Techniques , 1959, Proceedings of the IRE.
[30] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[31] I. S. Gradshteyn,et al. 1 – ELEMENTARY FUNCTIONS , 1980 .
[32] Hesham El Gamal,et al. The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.
[33] Esa R. Alotaibi,et al. Relay Selection for Multi-Destination in Cooperative Networks with Secrecy Constraints , 2014, 2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall).
[34] Carles Padró,et al. Information Theoretic Security , 2013, Lecture Notes in Computer Science.