Secure Semi-Blind AF relaying networks using multiple eavesdroppers
暂无分享,去创建一个
[1] Zhu Han,et al. Amplify-and-forward based cooperation for secure wireless communications , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[2] Power allocation for asymmetric two-way fixed-gain AF relaying networks , 2018, Telecommunication Systems.
[3] Hamid Jafarkhani,et al. Cooperative Jamming and Power Allocation for Wireless Relay Networks in Presence of Eavesdropper , 2011, 2011 IEEE International Conference on Communications (ICC).
[4] Zhu Han,et al. Physical Layer Security Game: Interaction between Source, Eavesdropper, and Friendly Jammer , 2009, EURASIP J. Wirel. Commun. Netw..
[5] Yupeng Liu,et al. Destination assisted cooperative jamming for wireless physical layer security , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[6] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[7] Jinhong Yuan,et al. Cooperative jamming protocols in two hop amplify-and-forward wiretap channels , 2013, 2013 IEEE International Conference on Communications (ICC).
[8] Farid Touati,et al. Secure two-user AF relaying networks using cooperative jamming , 2018, 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC).
[9] Hatem Boujemaa,et al. Multi-way semi-blind AF relaying networks over Rayleigh fading channels , 2018, Phys. Commun..
[10] D. Owen. Handbook of Mathematical Functions with Formulas , 1965 .
[11] Li Sun,et al. Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes , 2015, IEEE Communications Letters.
[12] Kamel Tourki,et al. Relay selection for optimized cooperative jamming scheme , 2015, 2015 23rd European Signal Processing Conference (EUSIPCO).
[13] Noureddine Hamdi,et al. Semi-blind two-way AF relaying over Nakagami-m fading environment , 2015, Ann. des Télécommunications.
[14] H. Vincent Poor,et al. The Gaussian wiretap channel with a helping interferer , 2008, 2008 IEEE International Symposium on Information Theory.
[15] Mohamed-Slim Alouini,et al. On the Jamming Power Allocation for Secure Amplify-and-Forward Relaying via Cooperative Jamming , 2013, IEEE Journal on Selected Areas in Communications.
[16] Kamel Tourki,et al. Secure cooperative untrusted-relay network with outdated CSI , 2016, 2016 International Wireless Communications and Mobile Computing Conference (IWCMC).
[17] R. Stephenson. A and V , 1962, The British journal of ophthalmology.
[18] Lajos Hanzo,et al. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.
[19] Joseph Lipka,et al. A Table of Integrals , 2010 .
[20] Zhu Han,et al. Secure wireless communications via cooperation , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[21] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[22] Victor C. M. Leung,et al. Improving physical-layer security in wireless communications using diversity techniques , 2014, IEEE Network.