Leaking Rate Region to Eavesdroppers and Untrusted Relays
暂无分享,去创建一个
[1] Tony Q. S. Quek,et al. Confidential Cooperative Communication With Trust Degree of Potential Eavesdroppers , 2016, IEEE Transactions on Wireless Communications.
[2] Yao-Win Peter Hong,et al. Multicasting with untrusted relays: A noncoherent secure network coding approach , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).
[3] Li Sun,et al. Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes , 2015, IEEE Communications Letters.
[4] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[5] Aylin Yener,et al. Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.
[6] Justin P. Coon,et al. Modelling trust in random wireless networks , 2014, 2014 11th International Symposium on Wireless Communications Systems (ISWCS).
[7] Shlomo Shamai,et al. Information Theoretic Security , 2009, Found. Trends Commun. Inf. Theory.
[8] Candice King,et al. Fundamentals of wireless communications , 2013, 2014 67th Annual Conference for Protective Relay Engineers.
[9] Sheng Chen,et al. Social-aware D2D communications: qualitative insights and quantitative analysis , 2014, IEEE Communications Magazine.
[10] Dongtang Ma,et al. Destination-Aided Cooperative Jamming for Dual-Hop Amplify-and-Forward MIMO Untrusted Relay Systems , 2016, IEEE Transactions on Vehicular Technology.
[11] David Tse,et al. Fundamentals of Wireless Communication , 2005 .
[12] Tony Q. S. Quek,et al. Physical-Layer Secret Key Generation With Colluding Untrusted Relays , 2016, IEEE Transactions on Wireless Communications.
[13] Xu Chen,et al. Exploiting Social Ties for Cooperative D2D Communications: A Mobile Social Networking Case , 2015, IEEE/ACM Transactions on Networking.