SRT analysis of relay selection in the presence of multiple co-channel interferers

[1]  George K. Karagiannidis,et al.  Secure Multiple Amplify-and-Forward Relaying With Cochannel Interference , 2016, IEEE Journal of Selected Topics in Signal Processing.

[2]  Kiseon Kim,et al.  Secrecy Outage Probability of Optimal Relay Selection for Secure AnF Cooperative Networks , 2015, IEEE Communications Letters.

[3]  Feng Liu,et al.  Joint Cooperative Beamforming, Jamming, and Power Allocation to Secure AF Relay Systems , 2015, IEEE Transactions on Vehicular Technology.

[4]  Saeed Vahidian,et al.  Relay Selection for Security-Constrained Cooperative Communication in the Presence of Eavesdropper's Overhearing and Interference , 2015, IEEE Wireless Communications Letters.

[5]  Tran Trung Duy,et al.  Secrecy performance analysis with relay selection methods under impact of co-channel interference , 2015, IET Commun..

[6]  Qiang Liu,et al.  Acquisition of channel state information in heterogeneous cloud radio access networks: challenges and research directions , 2015, IEEE Wireless Communications.

[7]  Minyi Guo,et al.  Secrecy Capacity Optimization via Cooperative Relaying and Jamming for WANETs , 2015, IEEE Transactions on Parallel and Distributed Systems.

[8]  Wei-Ping Zhu,et al.  Relay-Selection Improves the Security-Reliability Trade-Off in Cognitive Radio Systems , 2014, IEEE Transactions on Communications.

[9]  Bo Ai,et al.  Security and Reliability Performance Analysis for Cloud Radio Access Networks With Channel Estimation Errors , 2014, IEEE Access.

[10]  Saeed Vahidian,et al.  Performance analysis of two-way decode-and-forward relaying in the presence of co-channel interferences , 2014, 2014 22nd Iranian Conference on Electrical Engineering (ICEE).

[11]  Mugen Peng,et al.  Security-reliability performance of cognitive AF relay-based wireless communication system with channel estimation error , 2014, EURASIP Journal on Advances in Signal Processing.

[12]  Jiasong Mu,et al.  Throat polyp detection based on compressed big data of voice with support vector machine algorithm , 2014, EURASIP Journal on Advances in Signal Processing.

[13]  Lajos Hanzo,et al.  Security Versus Reliability Analysis of Opportunistic Relaying , 2013, IEEE Transactions on Vehicular Technology.

[14]  Alexandros G. Fragkiadakis,et al.  A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.

[15]  Qiang Li,et al.  Cooperative Secure Beamforming for AF Relay Networks With Multiple Eavesdroppers , 2013, IEEE Signal Processing Letters.

[16]  S. El-Rabaie,et al.  Proposed relay selection scheme for physical layer security in Cognitive Radio networks , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).

[17]  Kai-Kit Wong,et al.  Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays , 2011, IEEE Transactions on Signal Processing.

[18]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.

[19]  Ioannis Krikidis,et al.  Opportunistic relay selection for cooperative networks with secrecy constraints , 2010, IET Commun..

[20]  Xiqin Wang,et al.  Tradeoff between reliability and security in block ciphering systems with physical channel errors , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.

[21]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[22]  Nan Liu,et al.  Towards the Secrecy Capacity of the Gaussian MIMO Wire-Tap Channel: The 2-2-1 Channel , 2007, IEEE Transactions on Information Theory.

[23]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[24]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[25]  Ian F. Akyildiz,et al.  Wireless multimedia sensor networks: A survey , 2007, IEEE Wireless Communications.

[26]  Xiaoning Ding,et al.  Cooperative Relay Service in a Wireless LAN , 2007, IEEE Journal on Selected Areas in Communications.

[27]  Stamatios V. Kartalopoulos,et al.  A primer on cryptography in communications , 2006, IEEE Communications Magazine.

[28]  M.E. Hellman,et al.  An overview of public key cryptography , 1978, IEEE Communications Magazine.

[29]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[30]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[31]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[32]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..