Greedy Algorithm Applied Secrecy Rate Analysis in the Cooperative Communication
暂无分享,去创建一个
[1] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[2] Aria Nosratinia,et al. Cooperative communication in wireless networks , 2004, IEEE Communications Magazine.
[3] Jarernsri L. Mitrpanont,et al. Exhaustive Greedy Algorithm for Optimizing Intermediate Result Sizes of Join Queries , 2009, 2009 Eighth IEEE/ACIS International Conference on Computer and Information Science.
[4] Chintha Tellambura,et al. Admission control-based joint bandwidth and power allocation in multi-user DF relay networks , 2010, 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers.
[5] Geoffrey Ye Li,et al. Simplified Relay Selection and Power Allocation in Cooperative Cognitive Radio Systems , 2011, IEEE Transactions on Wireless Communications.
[6] Hsiao-Chen Lu,et al. Cooperative Strategies in Wireless Relay Networks , 2012, IEEE Journal on Selected Areas in Communications.
[7] Wan Choi,et al. On the Cooperative Diversity Gain in Underlay Cognitive Radio Systems , 2012, IEEE Transactions on Communications.
[8] Guevara Noubir,et al. Distributed Cooperation and Diversity for Hybrid Wireless Networks , 2010, IEEE Transactions on Mobile Computing.
[9] Andrei V. Gurtov,et al. Two-phase authentication protocol for wireless sensor networks in distributed IoT applications , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).
[10] Lifeng Wang,et al. Physical Layer Security of Maximal Ratio Combining in Two-Wave With Diffuse Power Fading Channels , 2014, IEEE Transactions on Information Forensics and Security.
[11] Xiaoming Chen,et al. Large-Scale MIMO Relaying Techniques for Physical Layer Security: AF or DF? , 2015, IEEE Transactions on Wireless Communications.
[12] Victor C. M. Leung,et al. Improving physical-layer security in wireless communications using diversity techniques , 2014, IEEE Network.