Imbalanced Beamforming by a Multi-Antenna Source for Secure Utilization of an Untrusted Relay
暂无分享,去创建一个
[1] Ramesh Annavajjala,et al. On the optimality of bit detection of certain digital modulations , 2005, IEEE Transactions on Communications.
[2] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[3] Byung-Jae Kwak,et al. LDPC Codes for the Gaussian Wiretap Channel , 2009, IEEE Transactions on Information Forensics and Security.
[4] Hesham El Gamal,et al. The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.
[5] Yasutada Oohama,et al. Coding for relay channels with confidential messages , 2001, Proceedings 2001 IEEE Information Theory Workshop (Cat. No.01EX494).
[6] A. Lee Swindlehurst,et al. Dirty Paper Coding versus Linear GSVD-Based Precoding in MIMO Broadcast Channel with Confidential Messages , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[7] Aylin Yener,et al. Two-Hop Secure Communication Using an Untrusted Relay , 2009, EURASIP J. Wirel. Commun. Netw..
[8] Stephan Pfletschinger,et al. Error Floor Removal for Bit-Interleaved Coded Modulation with Iterative Detection , 2006, IEEE Transactions on Wireless Communications.
[9] Matthew C. Valenti,et al. Constellation Labeling Maps for Low Error Floors , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[10] Il-Min Kim,et al. Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.
[11] Aylin Yener,et al. Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.
[12] A. Lee Swindlehurst,et al. Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.
[13] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[14] A. Lee Swindlehurst,et al. Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels , 2013, IEEE Transactions on Signal Processing.
[15] Kin K. Leung,et al. Opportunistic Relaying for Secrecy Communications: Cooperative Jamming vs. Relay Chatting , 2011, IEEE Transactions on Wireless Communications.
[16] Dongwoo Kim,et al. BER analysis for decode-and-forward relaying in dissimilar Rayleigh fading channels , 2007, IEEE Communications Letters.