SDMA with secrecy constraints
暂无分享,去创建一个
Enzo Baccarelli | Mauro Biagi | Nicola Cordeschi | Valentina Polli | Tatiana Patriarca | E. Baccarelli | M. Biagi | N. Cordeschi | T. Patriarca | Valentina Polli
[1] Roy D. Yates,et al. The Discrete Memoryless Multiple Access Channel with Confidential Messages , 2006, 2006 IEEE International Symposium on Information Theory.
[2] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.
[3] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[4] H. Vincent Poor,et al. Multiple-Access Channels With Confidential Messages , 2008, IEEE Transactions on Information Theory.
[5] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2007, IEEE Transactions on Information Theory.
[6] Enzo Baccarelli,et al. On the Information Rate of Multiantenna Systems With Isotropic Unitary Input Signals in the Presence of Channel Estimation Errors , 2007, IEEE Transactions on Signal Processing.
[7] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[8] P. Deuflhard. Newton Methods for Nonlinear Problems: Affine Invariance and Adaptive Algorithms , 2011 .
[9] H. Vincent Poor,et al. Multiple Access Channels with Generalized Feedback and Confidential Messages , 2007, 2007 IEEE Information Theory Workshop.
[10] Enzo Baccarelli,et al. Power-allocation policy and optimized design of multiple-antenna systems with imperfect channel estimation , 2004, IEEE Transactions on Vehicular Technology.
[11] Hesham El Gamal,et al. The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.
[12] Yasutada Oohama,et al. Coding for relay channels with confidential messages , 2001, Proceedings 2001 IEEE Information Theory Workshop (Cat. No.01EX494).
[13] Shlomo Shamai,et al. Cognitive Interference Channels with Confidential Messages , 2007, ArXiv.
[14] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[15] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[16] Elza Erkip,et al. The Relay Channel with a Wire-tapper , 2007, 2007 41st Annual Conference on Information Sciences and Systems.
[17] Enzo Baccarelli,et al. Optimized Power Allocation for Multiantenna Systems Impaired by Multiple Access Interference and Imperfect Channel Estimation , 2007, IEEE Transactions on Vehicular Technology.
[18] Roy D. Yates,et al. Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions , 2007, IEEE Transactions on Information Theory.
[19] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.