Cross MAC/PHY layer security design using ARQ with MRC and adaptive modulation
暂无分享,去创建一个
[1] Yong Xi,et al. Packet Error Rate Analysis and Power Allocation for CC-HARQ Over Rayleigh Fading Channels , 2014, IEEE Communications Letters.
[2] Huseyin Arslan,et al. Cyclic Feature Concealing CP Selection for Physical Layer Security , 2014, 2014 IEEE Military Communications Conference.
[3] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[4] H. Vincent Poor,et al. On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels , 2007, IEEE Transactions on Information Theory.
[5] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[6] Nicola Laurenti,et al. Secure HARQ With Multiple Encoding Over Block Fading Channels: Channel Set Characterization and Outage Analysis , 2014, IEEE Transactions on Information Forensics and Security.
[7] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[8] Erik G. Larsson,et al. Optimal Power Allocation for Hybrid ARQ with Chase Combining in i.i.d. Rayleigh Fading Channels , 2013, IEEE Transactions on Communications.
[9] Hyundong Shin,et al. Cooperative Communications with Outage-Optimal Opportunistic Relaying , 2007, IEEE Transactions on Wireless Communications.
[10] Vijay K. Bhargava,et al. Secure Transmission in Multicell Massive MIMO Systems , 2014, IEEE Transactions on Wireless Communications.
[11] Dimitris A. Pados,et al. Hybrid-ARQ as a communications security measure , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[12] A. Robert Calderbank,et al. Applications of LDPC Codes to the Wiretap Channel , 2004, IEEE Transactions on Information Theory.
[13] Hsiao-Chun Wu,et al. Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.
[14] Ming Li,et al. Waveform Design for Secure SISO Transmissions and Multicasting , 2013, IEEE Journal on Selected Areas in Communications.
[15] H. Vincent Poor,et al. Secure Nested Codes for Type II Wiretap Channels , 2007, 2007 IEEE Information Theory Workshop.
[16] Marco Baldi,et al. Coding With Scrambling, Concatenation, and HARQ for the AWGN Wire-Tap Channel: A Security Gap Analysis , 2012, IEEE Transactions on Information Forensics and Security.
[17] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[18] Pierre Duhamel,et al. Rate-adaptive secure HARQ protocol for block-fading channels , 2014, 2014 22nd European Signal Processing Conference (EUSIPCO).
[19] Erik G. Larsson,et al. Optimal Power Allocation for Hybrid ARQ with Chase Combining in i , 2013 .
[20] Leszek Szczecinski,et al. Secrecy & Rate Adaptation for secure HARQ protocols , 2013, 2013 IEEE Information Theory Workshop (ITW).