Performance of Transmit Antenna Selection Physical Layer Security Schemes
暂无分享,去创建一个
Mehdi Bennis | Hirley Alves | Richard Demo Souza | Mérouane Debbah | M. Debbah | M. Bennis | H. Alves | R. Souza
[1] Miguel R. D. Rodrigues,et al. On Wireless Channels with M-Antenna Eavesdroppers: Characterization of the Outage Probability and Outage Secrecy Capacity , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[2] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[3] Zhi Ding,et al. On Secrecy of Codebook-Based Transmission Beamforming under Receiver Limited Feedback , 2011, IEEE Transactions on Wireless Communications.
[4] Aria Nosratinia,et al. Antenna selection in MIMO systems , 2004, IEEE Communications Magazine.
[5] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2007, IEEE Transactions on Information Theory.
[6] Fadhel M. Ghannouchi,et al. Single RF front-end MIMO transceivers , 2011, IEEE Commun. Mag..
[7] M. Abramowitz,et al. Handbook of Mathematical Functions With Formulas, Graphs and Mathematical Tables (National Bureau of Standards Applied Mathematics Series No. 55) , 1965 .
[8] Shiva Prakash,et al. Effects of Channel Prediction for Transmit Antenna Selection With Maximal-Ratio Combining in Rayleigh Fading , 2011, IEEE Transactions on Vehicular Technology.
[9] Miguel R. D. Rodrigues,et al. Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.
[10] Branka Vucetic,et al. Analysis of transmit antenna selection/maximal-ratio combining in Rayleigh fading channels , 2005, IEEE Transactions on Vehicular Technology.
[11] Miguel R. D. Rodrigues,et al. On Wireless Channels With ${M}$-Antenna Eavesdroppers: Characterization of the Outage Probability and $\varepsilon $-Outage Secrecy Capacity , 2011, IEEE Transactions on Information Forensics and Security.
[12] Hong Man,et al. Maximal Ratio Diversity Combining Enhanced Security , 2011, IEEE Communications Letters.
[13] D. Owen. Handbook of Mathematical Functions with Formulas , 1965 .
[14] Milton Abramowitz,et al. Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables , 1964 .
[15] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[16] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.