On Ergodic Secrecy Capacity of Random Wireless Networks With Protected Zones
暂无分享,去创建一个
Tharmalingam Ratnarajah | Zhiguo Ding | Jiang Xue | Weigang Liu | T. Ratnarajah | Z. Ding | J. Xue | Weigang Liu
[1] Martin Haenggi,et al. Stochastic Geometry for Wireless Networks , 2012 .
[2] M. Haenggi,et al. Interference in Large Wireless Networks , 2009, Found. Trends Netw..
[3] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[4] Moe Z. Win,et al. Secure Communication in Stochastic Wireless Networks—Part I: Connectivity , 2012, IEEE Transactions on Information Forensics and Security.
[5] Moe Z. Win,et al. Secure Communication in Stochastic Wireless Networks—Part II: Maximum Rate and Collusion , 2012, IEEE Transactions on Information Forensics and Security.
[6] Wan Choi,et al. Enhanced Secrecy in Stochastic Wireless Networks: Artificial Noise With Secrecy Protected Zone , 2014, IEEE Transactions on Information Forensics and Security.
[7] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[8] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.
[9] Can Emre Koksal,et al. On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Trans. Inf. Theory.
[10] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[11] Kerstin Vogler,et al. Table Of Integrals Series And Products , 2016 .
[12] Mazen O. Hasna,et al. On Ergodic Capacity of Wireless Transmission Subject to Poisson Distributed Interferers over Rayleigh Fading Channels , 2013, 2013 IEEE 77th Vehicular Technology Conference (VTC Spring).
[13] Hyundong Shin,et al. Stochastic wireless secure multicasting , 2013, 2013 IEEE International Conference on Communications (ICC).
[14] Shlomo Shamai,et al. Secrecy Capacity Region of Fading Broadcast Channels , 2007, 2007 IEEE International Symposium on Information Theory.
[15] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[16] Shi Jin,et al. On the ergodic secrecy rate of multiple-antenna wiretap channels using artificial noise and finite-rate feedback , 2011, 2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications.
[17] João Barros,et al. Position-Based Jamming for Enhanced Wireless Secrecy , 2011, IEEE Transactions on Information Forensics and Security.
[18] Yuan Li,et al. Co‐channel interference in two‐tier heterogeneous networks: analytical model and ergodic capacity , 2016, Trans. Emerg. Telecommun. Technol..
[19] Jeffrey G. Andrews,et al. Secure Wireless Network Connectivity with Multi-Antenna Transmission , 2011, IEEE Transactions on Wireless Communications.
[20] Martin Haenggi,et al. Interference and Outage in Poisson Cognitive Networks , 2012, IEEE Transactions on Wireless Communications.
[21] Martin Haenggi,et al. Mean Interference in Hard-Core Wireless Networks , 2011, IEEE Communications Letters.
[22] Ananthram Swami,et al. PHY Layer Security Based on Protected Zone and Artificial Noise , 2013, IEEE Signal Processing Letters.
[23] Yang Bin. Physical Layer Security in Wireless Communication , 2012 .
[24] Martin Haenggi,et al. On distances in uniformly random networks , 2005, IEEE Transactions on Information Theory.
[25] Jeffrey G. Andrews,et al. On the Throughput Cost of Physical Layer Security in Decentralized Wireless Networks , 2010, IEEE Transactions on Wireless Communications.
[26] Joseph Lipka,et al. A Table of Integrals , 2010 .
[27] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[28] Matthew R. McKay,et al. Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.
[29] Jeffrey G. Andrews,et al. Secrecy Rates in Broadcast Channels with Confidential Messages and External Eavesdroppers , 2013, IEEE Transactions on Wireless Communications.
[30] Matthew R. McKay,et al. Physical layer security with artificial noise: Secrecy capacity and optimal power allocation , 2009, 2009 3rd International Conference on Signal Processing and Communication Systems.
[31] Mounir Ghogho,et al. Physical-Layer Secrecy of MIMO Communications in the Presence of a Poisson Random Field of Eavesdroppers , 2011, 2011 IEEE International Conference on Communications Workshops (ICC).
[32] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[33] Giuseppe Thadeu Freitas de Abreu,et al. Unicasting on the Secrecy Graph , 2013, IEEE Transactions on Information Forensics and Security.
[34] Martin Haenggi. A Geometric Interpretation of Fading in Wireless Networks: Theory and Applications , 2008, IEEE Transactions on Information Theory.
[35] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[36] Martin Haenggi,et al. Interference and Outage in Doubly Poisson Cognitive Networks , 2010, 2010 Proceedings of 19th International Conference on Computer Communications and Networks.
[37] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.