A Secrecy and Security Dilemma in OFDM Communications
暂无分享,去创建一个
[1] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.
[2] R. Negi,et al. Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..
[3] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[4] Shlomo Shamai,et al. Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.
[5] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[6] Meejoung Kim,et al. Analysis of eavesdropping attack in mmWave-based WPANs with directional antennas , 2017, Wirel. Networks.
[7] Shlomo Shamai,et al. Information Theoretic Security , 2009, Found. Trends Commun. Inf. Theory.
[8] H. Vincent Poor,et al. Secure Communications over Fading Channels , 2007, ArXiv.
[9] Andrey Garnaev,et al. The eavesdropping and Jamming Dilemma in multi-channel communications , 2013, 2013 IEEE International Conference on Communications (ICC).
[10] H. Vincent Poor,et al. A Game Theoretic Analysis of Secret and Reliable Communication With Active and Passive Adversarial Modes , 2016, IEEE Transactions on Wireless Communications.
[11] Xi Fang,et al. Optimal transmission power control in the presence of a smart jammer , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[12] Andrey Garnaev,et al. To Eavesdrop or Jam, That is the Question , 2013, ADHOCNETS.
[13] Qi Xiong,et al. An Energy-Ratio-Based Approach for Detecting Pilot Spoofing Attack in Multiple-Antenna Systems , 2015, IEEE Transactions on Information Forensics and Security.
[14] Roy D. Yates,et al. Secret Communication with a Fading Eavesdropper Channel , 2007, 2007 IEEE International Symposium on Information Theory.
[15] H. Vincent Poor,et al. Interference Alignment for Secrecy , 2008, IEEE Transactions on Information Theory.
[16] Andrey Garnaev,et al. Optimizing scanning strategies: Selecting scanning bandwidth in adversarial RF environments , 2013 .
[17] Reevana Balmahoon,et al. Information leakage of heterogeneous encoded correlated sequences over an eavesdropped channel , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).
[18] Sabrina Engelmann,et al. Information Leakage Neutralization for the Multi-Antenna Non-Regenerative Relay-Assisted Multi-Carrier Interference Channel , 2012, IEEE Journal on Selected Areas in Communications.
[19] Zhi Ding,et al. Optimum Power Allocation against Information Leakage in Wireless Network , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[20] K. J. Ray Liu,et al. An Information Secrecy Game in Cognitive Radio Networks , 2011, IEEE Transactions on Information Forensics and Security.
[21] Andrey Garnaev,et al. Secret Communication When the Eavesdropper Might Be an Active Adversary , 2014, MACOM.
[22] Jianhua Ge,et al. An Effective Secure Transmission Scheme for AF Relay Networks with Two-Hop Information Leakage , 2013, IEEE Communications Letters.
[23] Walid Saad,et al. Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach , 2011, 2011 - MILCOM 2011 Military Communications Conference.
[24] E. Kalai,et al. OTHER SOLUTIONS TO NASH'S BARGAINING PROBLEM , 1975 .
[25] H. Vincent Poor,et al. Incorporating Attack-Type Uncertainty Into Network Protection , 2014, IEEE Transactions on Information Forensics and Security.
[26] Alagan Anpalagan,et al. Strategic bargaining in wireless networks: basics, opportunities and challenges , 2014, IET Commun..
[27] Andrey Garnaev,et al. Anti-jamming Strategies: A Stochastic Game Approach , 2014, MONAMI.
[28] Andrey Garnaev,et al. One-Time Spectrum Coexistence in Dynamic Spectrum Access When the Secondary User May Be Malicious , 2015, IEEE Transactions on Information Forensics and Security.
[29] Andrey Garnaev,et al. A Bandwidth Monitoring Strategy Under Uncertainty of the Adversary’s Activity , 2016, IEEE Transactions on Information Forensics and Security.
[30] Eitan Altman,et al. Transmission Power Control Game with SINR as Objective Function , 2008, NET-COOP.
[31] Mário S. Alvim,et al. Measuring Information Leakage Using Generalized Gain Functions , 2012, 2012 IEEE 25th Computer Security Foundations Symposium.