Multi-user diversity for secrecy in wireless networks
暂无分享,去创建一个
Kin K. Leung | Donald F. Towsley | Zhiguo Ding | Dennis Goeckel | Sudarshan Vasudevan | Stephan Adams
[1] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[2] David Tse,et al. Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels , 2007, IEEE Transactions on Information Forensics and Security.
[3] Andrea J. Goldsmith,et al. Large wireless networks under fading, mobility, and delay constraints , 2004, IEEE INFOCOM 2004.
[4] Aylin Yener,et al. Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[5] Russ Bubley,et al. Randomized algorithms , 1995, CSUR.
[6] Hossein Pishro-Nik,et al. Dense Parity Check Based Secrecy Sharing in Wireless Communications , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[7] Hesham El Gamal,et al. Cooperative Secrecy: The Relay-Eavesdropper Channel , 2007, 2007 IEEE International Symposium on Information Theory.
[8] J. Corcoran. Modelling Extremal Events for Insurance and Finance , 2002 .
[9] C. Klüppelberg,et al. Modelling Extremal Events , 1997 .
[10] R. Negi,et al. Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..