On the zero forcing optimality for friendly jamming in MISO wiretap channels
暂无分享,去创建一个
[1] A. Lee Swindlehurst,et al. Utility of beamforming strategies for secrecy in multiuser MIMO wiretap channels , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[2] H. Vincent Poor,et al. Interference Assisted Secret Communication , 2008, IEEE Transactions on Information Theory.
[3] Roy D. Yates,et al. Secret Communication via Multi-antenna Transmission , 2007, 2007 41st Annual Conference on Information Sciences and Systems.
[4] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[5] Eduard A. Jorswieck. Secrecy capacity of single- and multi-antenna channels with simple helpers , 2010, 2010 International ITG Conference on Source and Channel Coding (SCC).
[6] Shlomo Shamai,et al. Information Theoretic Security , 2009, Found. Trends Commun. Inf. Theory.
[7] Zhu Han,et al. Cooperative jamming for wireless physical layer security , 2009, 2009 IEEE/SP 15th Workshop on Statistical Signal Processing.
[8] Xiang He,et al. Cooperative Jamming: The Tale of Friendly Interference for Secrecy , 2009 .
[9] Holger Boche,et al. Multiple-antenna capacity in the low-power regime: channel knowledge and correlation , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[10] Eduard A. Jorswieck,et al. Secrecy on the Physical Layer in Wireless Networks , 2010 .
[11] Eduard A. Jorswieck,et al. Beamforming for fading wiretap channels with partial channel information , 2010, 2010 International ITG Workshop on Smart Antennas (WSA).
[12] Erik G. Larsson,et al. Complete Characterization of the Pareto Boundary for the MISO Interference Channel , 2008, IEEE Transactions on Signal Processing.
[13] Sergio Verdú,et al. Spectral efficiency in the wideband regime , 2002, IEEE Trans. Inf. Theory.
[14] R. Negi,et al. Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..
[15] Zhu Han,et al. Physical Layer Security Game: Interaction between Source, Eavesdropper, and Friendly Jammer , 2009, EURASIP J. Wirel. Commun. Netw..
[16] Matthew R. McKay,et al. Physical layer security with artificial noise: Secrecy capacity and optimal power allocation , 2009, 2009 3rd International Conference on Signal Processing and Communication Systems.