Physical Layer Security for Primary System: A Symbiotic Approach in Cooperative Cognitive Radio Networks
暂无分享,去创建一个
[1] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[2] Feifei Gao,et al. Joint Information- and Jamming-Beamforming for Physical Layer Security With Full Duplex Base Station , 2014, IEEE Transactions on Signal Processing.
[3] Yiyang Pei,et al. Secure Communication in Multiantenna Cognitive Radio Networks With Imperfect Channel State Information , 2011, IEEE Transactions on Signal Processing.
[4] Dimitri P. Bertsekas,et al. Nonlinear Programming , 1997 .
[5] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.
[6] Jamie S. Evans,et al. Secrecy rate maximization for cooperative overlay cognitive radio networks with artificial noise , 2014, 2014 IEEE International Conference on Communications (ICC).
[7] Lars K. Rasmussen,et al. Cooperation for secure broadcasting in cognitive radio networks , 2012, 2012 IEEE International Conference on Communications (ICC).
[8] Matthew R. McKay,et al. Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.
[9] Stephen J. Wright,et al. Numerical Optimization , 2018, Fundamental Statistical Inference.
[10] Matthieu R. Bloch,et al. Physical Layer Security , 2020, Encyclopedia of Wireless Networks.
[11] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[12] Yiyang Pei,et al. Secure communication over MISO cognitive radio channels , 2010, IEEE Transactions on Wireless Communications.
[13] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[14] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[15] Tiep Minh Hoang,et al. Secrecy Capacity of the Primary System in a Cognitive Radio Network , 2015, IEEE Transactions on Vehicular Technology.
[16] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.