On Secure Wireless Communications for Service Oriented Computing
暂无分享,去创建一个
[1] Kin K. Leung,et al. Artificial Noise Generation from Cooperative Relays for Everlasting Secrecy in Two-Hop Wireless Networks , 2011, IEEE Journal on Selected Areas in Communications.
[2] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[3] Alfred O. Hero,et al. Secure space-time communication , 2003, IEEE Trans. Inf. Theory.
[4] Georgios Kambourakis,et al. Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset , 2016, IEEE Communications Surveys & Tutorials.
[5] Donald F. Towsley,et al. Physical layer security from inter-session interference in large wireless networks , 2012, 2012 Proceedings IEEE INFOCOM.
[6] A. Lee Swindlehurst,et al. Cooperative Jamming for Secure Communications in MIMO Relay Networks , 2011, IEEE Transactions on Signal Processing.
[7] John S. Thompson,et al. Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.
[8] Blake D. Bryant,et al. IEEE Transactions on Information Forensics and Security , 2018 .
[9] Xinbing Wang,et al. Impact of secrecy on capacity in large-scale wireless networks , 2012, 2012 Proceedings IEEE INFOCOM.
[10] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[11] Matthieu R. Bloch,et al. Wireless Secrecy Regions With Friendly Jamming , 2011, IEEE Transactions on Information Forensics and Security.
[12] H. Vincent Poor,et al. Secrecy Throughput of MANETs Under Passive and Active Attacks , 2011, IEEE Transactions on Information Theory.
[13] R. Negi,et al. Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..
[14] Peter W. Shor,et al. Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[15] Martin Haenggi. The secrecy graph and some of its properties , 2008, 2008 IEEE International Symposium on Information Theory.
[16] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[17] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[18] Jie Li,et al. Secrecy capacity maximization for secure cooperative ad-hoc networks , 2013, 2013 Proceedings IEEE INFOCOM.
[19] Xiaohong Jiang,et al. Flexible relay selection for secure communication in two-hop wireless networks , 2013, 2013 11th International Symposium and Workshops on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt).
[20] Xinbing Wang,et al. Secrecy capacity scaling of large-scale cognitive networks , 2014, MobiHoc '14.
[21] Xiaohong Jiang,et al. Eavesdropper tolerance capability study in two-hop cooperative wireless networks , 2013, 2013 IEEE/CIC International Conference on Communications in China (ICCC).
[22] Aggelos Bletsas,et al. A simple Cooperative diversity method based on network path selection , 2005, IEEE Journal on Selected Areas in Communications.
[23] Miguel R. D. Rodrigues,et al. Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.
[24] Georgios Kambourakis,et al. DoS attacks exploiting signaling in UMTS and IMS , 2011, Comput. Commun..
[25] João Barros,et al. Position-Based Jamming for Enhanced Wireless Secrecy , 2011, IEEE Transactions on Information Forensics and Security.
[26] R. Negi,et al. Secret communication in presence of colluding eavesdroppers , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.
[27] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[28] Kin K. Leung,et al. Opportunistic Relaying for Secrecy Communications: Cooperative Jamming vs. Relay Chatting , 2011, IEEE Transactions on Wireless Communications.
[29] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[30] Contact details of the first author: , 2022 .
[31] Yi Xie,et al. Resisting Web Proxy-Based HTTP Attacks by Temporal and Spatial Locality Behavior , 2013, IEEE Transactions on Parallel and Distributed Systems.
[32] Jeffrey G. Andrews,et al. On the Throughput Cost of Physical Layer Security in Decentralized Wireless Networks , 2010, IEEE Transactions on Wireless Communications.
[33] Min Chen,et al. User-Oriented and Service-oriented Spontaneous Ad Hoc and Sensor Wireless Networks , 2012, Ad Hoc Sens. Wirel. Networks.
[34] Can Emre Koksal,et al. On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Trans. Inf. Theory.
[35] Donald F. Towsley,et al. Security-capacity trade-off in large wireless networks using keyless secrecy , 2010, MobiHoc '10.
[36] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[37] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[38] Paolo Traverso,et al. Service-Oriented Computing: State of the Art and Research Challenges , 2007, Computer.
[39] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[40] Raef Bassily,et al. Deaf Cooperation and Relay Selection Strategies for Secure Communication in Multiple Relay Networks , 2013, IEEE Transactions on Signal Processing.
[41] Xinbing Wang,et al. Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks , 2014, IEEE/ACM Transactions on Networking.
[42] Donald F. Towsley,et al. Secret communication in large wireless networks without eavesdropper location information , 2012, 2012 Proceedings IEEE INFOCOM.
[43] L. Mattner,et al. Stochastic ordering of classical discrete distributions , 2009, Advances in Applied Probability.
[44] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[45] Eric Mayer. Service Oriented Computing Semantics Processes Agents , 2016 .
[46] Georgios Kambourakis,et al. Attacks and Countermeasures on 802.16: Analysis and Assessment , 2013, IEEE Communications Surveys & Tutorials.
[47] Steven P. Weber,et al. On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.
[48] Onur Ozan Koyluoglu,et al. On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Transactions on Information Theory.
[49] Sathya Narayanan,et al. Two-hop forwarding in wireless networks , 2006 .