Applications of Game Theory for Physical Layer Security
暂无分享,去创建一个
Mingliang Li | Kaizhi Huang | Zhou Zhong | Hua Zhao | Kaizhi Huang | Zhou Zhong | Hua Zhao | Mingliang Li
[1] Michael R. Bartolacci,et al. Research, Practice, and Educational Advancements in Telecommunications and Networking , 2012 .
[2] M. Falch. Handbook of Research on Global Diffusion of Broadband Data Transmission , 2008 .
[3] Matt Jones. Selected Readings on Telecommunications and Networking , 1970 .
[4] Shlomo Shamai,et al. Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.
[5] Samir Chatterjee,et al. International Journal of Business Data Communications and Networking , 2010 .
[6] H. Vincent Poor,et al. Secure Communications Over Wireless Broadcast Networks: Stability and Utility Maximization , 2011, IEEE Transactions on Information Forensics and Security.
[7] Zhu Han,et al. Secure wireless communications via cooperation , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[8] Wathiq Mansoor,et al. Distributed Resources Management in Wireless LANs , 2006, Int. J. Bus. Data Commun. Netw..
[9] R. Srikant,et al. Correlated Jamming on MIMO Gaussian Fading Channels , 2004, IEEE Trans. Inf. Theory.
[10] Dan Pescaru,et al. Data Processing and Exchange Challenges in Video-Based Wireless Sensor Networks , 2014 .
[11] Mohd Nazri Ismail,et al. Network Analyzer Development Comparison with Independent Data and Benchmark Products: Network Traffic Utilization , 2010, Int. J. Interdiscip. Telecommun. Netw..
[12] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[13] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[14] John S. Thompson,et al. Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.
[15] Nei Kato,et al. Multi-Path Video Streaming in Wireless Networks using Time-Slot based Scheduling , 2008, Int. J. Bus. Data Commun. Netw..
[16] Zhu Han,et al. Coalitional game theory for communication networks , 2009, IEEE Signal Processing Magazine.
[17] Nick Antonopoulos,et al. Optimising P2P Networks by Adaptive Overlay Construction , 2009 .
[18] Amin A. Shaqrah. Antecedents of Security Pillars in E-Commerce Applications , 2011, Int. J. Bus. Data Commun. Netw..
[19] Yogesk K. Dwivedi,et al. A Longitudinal Study to Investigate Consumer/User Adoption and Use of Broadband in the Netherlands , 2008 .
[20] Yang Cao,et al. Distributed coalition formation for selfish relays and eavesdroppers in wireless networks: A job-hopping game , 2012, 2012 International Conference on Wireless Communications and Signal Processing (WCSP).
[21] Y. K. Dwivedi. Development of Survey Instrument: Confirmatory Survey , 2008 .
[22] T. Başar,et al. A Stackelberg Network Game with a Large Number of Followers , 2002 .
[23] Gabriel-Miro Muntean,et al. Convergence of Broadband, Broadcast, and Cellular Network Technologies , 2014 .
[24] Debashis Saha,et al. Web-Based Multimedia Advancements in Data Communications and Networking Technologies , 2012 .
[25] Fabio Tosti,et al. FDTD Simulation of the GPR Signal for Preventing the Risk of Accidents due to Pavement Damages , 2014, Int. J. Interdiscip. Telecommun. Netw..
[26] Jeffrey G. Andrews,et al. Secrecy Rates in Broadcast Channels with Confidential Messages and External Eavesdroppers , 2013, IEEE Transactions on Wireless Communications.
[27] A. Lee Swindlehurst,et al. Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper , 2010, IEEE Transactions on Signal Processing.
[28] Steven P. Weber,et al. On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.
[29] Zhu Han,et al. Distributed Coalition Formation of Relay and Friendly Jammers for Secure Cooperative Networks , 2011, 2011 IEEE International Conference on Communications (ICC).
[30] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998 .
[31] Bruce Schneier,et al. Cryptographic Design Vulnerabilities , 1998, Computer.
[32] J. L. Massey,et al. An introduction to contemporary cryptology , 1988, Proc. IEEE.
[33] Ye Ouyang,et al. A Dimensioning Study for UMTS Core Networks , 2010, Int. J. Bus. Data Commun. Netw..
[34] George Pallis,et al. Integrating Caching Techniques in CDNs using a Classification Approach , 2008, Int. J. Bus. Data Commun. Netw..
[35] Hui Yu,et al. Secrecy capacity optimization in coordinated multi-point processing , 2013, 2013 IEEE International Conference on Communications (ICC).
[36] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[37] An Wang,et al. A Stackelberg security game with cooperative jamming over a multiuser OFDMA network , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).
[38] Mario Gerla,et al. Physical layer security in wireless smart grid , 2012, IEEE Communications Magazine.
[39] Chetna Singhal,et al. Resource Allocation in Heterogeneous Broadband Wireless Access Networks , 2014 .
[40] Lawrence M. Ausubel. An Efficient Ascending-Bid Auction for Multiple Objects , 2004 .
[41] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.