Encryption scheme against eavesdropper collusion in wireless multi-user network
暂无分享,去创建一个
Jing Lei | Wei Li | Ying Huang | Jing Lei | Wei Li | Ying Huang
[1] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[2] Ying Huang,et al. Concatenated physical layer encryption scheme based on rateless codes , 2018, IET Commun..
[3] Guang Gong,et al. XOR Encryption Versus Phase Encryption, an In-Depth Analysis , 2015, IEEE Transactions on Electromagnetic Compatibility.
[4] Neil Smith,et al. Practical physical-layer encryption: The marriage of optical noise with traditional cryptography , 2009, IEEE Communications Magazine.
[5] Xiaohong Jiang,et al. On Secure Wireless Communications for IoT Under Eavesdropper Collusion , 2016, IEEE Transactions on Automation Science and Engineering.
[6] Ying Huang,et al. Multi-dimensional encryption scheme based on physical layer for fading channel , 2018, IET Commun..
[7] Junqing Zhang,et al. Design of an OFDM Physical Layer Encryption Scheme , 2017, IEEE Transactions on Vehicular Technology.
[8] Liang Jin,et al. Secure transmission scheme based on dual- thresholds for simultaneous wireless information and power transfer , 2017, China Communications.
[9] Abbas El Gamal,et al. Capacity theorems for the relay channel , 1979, IEEE Trans. Inf. Theory.
[10] Rui Chang,et al. Interference coordination and cancellation for 4G networks , 2009, IEEE Communications Magazine.
[11] Jing Lei,et al. Joint network and fountain codes design for relay-assisted multi-user system , 2015, China Communications.
[12] Xuemin Shen,et al. A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.
[13] Brighten Godfrey,et al. VeriFlow: verifying network-wide invariants in real time , 2012, HotSDN '12.
[14] Zhen Li,et al. SIC-Based Secrecy Performance in Uplink NOMA Multi-Eavesdropper Wiretap Channels , 2018, IEEE Access.
[15] Jiaru Lin,et al. Optimal Secure Multicast With Simultaneous Wireless Information and Power Transfer in Presence of Multiparty Eavesdropper Collusion , 2016, IEEE Transactions on Vehicular Technology.
[16] Wei Li,et al. Asymmetric Physical Layer Encryption for Wireless Communications , 2019, IEEE Access.
[17] Rong Mei. Rayleigh quotient based interference alignment spectrum sharing in MIMO cognitive radio networks , 2015, China Communications.