On Security-Delay Trade-Off in Two-Hop Wireless Networks With Buffer-Aided Relay Selection
暂无分享,去创建一个
Hiroshi Inamura | Zhenqiang Wu | Xiaohong Jiang | Yulong Shen | Yuanyu Zhang | Xuening Liao | Zhenqiang Wu | Xiaohong Jiang | H. Inamura | Yulong Shen | Xuening Liao | Yuanyu Zhang
[1] Rodrigo C. de Lamare,et al. Study of Relay Selection for Physical-Layer Security in Buffer-Aided Relay Networks Based on the Secrecy Rate Criterion , 2016, ArXiv.
[2] Feifei Gao,et al. Zero-forcing beamforming for physical layer security of energy harvesting wireless communications , 2015, EURASIP Journal on Wireless Communications and Networking.
[3] H. Vincent Poor,et al. Cooperative Beamforming and User Selection for Improving the Security of Relay-Aided Systems , 2015, IEEE Transactions on Communications.
[4] John S. Thompson,et al. Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.
[5] Yajun Zhang,et al. A New Max-Ratio Relay Selection Scheme in Secure Buffer-Aided Cooperative Wireless Networks , 2015, 2015 8th International Symposium on Computational Intelligence and Design (ISCID).
[6] Meixia Tao,et al. Relay Placement for Physical Layer Security: A Secure Connection Perspective , 2012, IEEE Communications Letters.
[7] Li Xu,et al. Stackelberg game based relay selection for physical layer security and energy efficiency enhancement in cognitive radio networks , 2017, Appl. Math. Comput..
[8] Huiming Wang,et al. On the Secrecy Throughput Maximization for MISO Cognitive Radio Network in Slow Fading Channels , 2014, IEEE Transactions on Information Forensics and Security.
[9] A. Lee Swindlehurst,et al. Buffer-Aided Relaying for Two-Hop Secure Communication , 2015, IEEE Transactions on Wireless Communications.
[10] Zhenqiang Wu,et al. The Delay-Security Trade-Off in Two-Hop Buffer-Aided Relay Wireless Network , 2016, 2016 International Conference on Networking and Network Applications (NaNA).
[11] J. Barros,et al. LDPC codes for the Gaussian wiretap channel , 2009 .
[12] Zhi Chen,et al. Max-Ratio Relay Selection in Secure Buffer-Aided Cooperative Wireless Networks , 2014, IEEE Transactions on Information Forensics and Security.
[13] A. Lee Swindlehurst,et al. Cooperative Jamming for Secure Communications in MIMO Relay Networks , 2011, IEEE Transactions on Signal Processing.
[14] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[15] Hong Wen,et al. Achieving Secure Communications over Wiretap Channels via Security Codes from Resilient Functions , 2014, IEEE Wireless Communications Letters.
[16] Peter W. Shor,et al. Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[17] Byung-Jae Kwak,et al. LDPC Codes for the Gaussian Wiretap Channel , 2009, IEEE Transactions on Information Forensics and Security.
[18] Vahid Jamali,et al. Bidirectional Buffer-Aided Relay Networks With Fixed Rate Transmission - Part II: Delay-Constrained Case , 2015, IEEE Trans. Wirel. Commun..
[19] Remi A. Chou,et al. Polar coding for the multiple access wiretap channel via rate-splitting and cooperative jamming , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).
[20] A T Karygiannis,et al. Wireless Network Security: 802.11, Bluetooth and Handheld Devices , 2002 .
[21] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[22] Can Emre Koksal,et al. On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Trans. Inf. Theory.
[23] Katrin Baumgartner,et al. Computer Networks And Systems Queueing Theory And Performance Evaluation , 2016 .
[24] Xiangyun Zhou,et al. When Does Relay Transmission Give a More Secure Connection in Wireless Ad Hoc Networks? , 2014, IEEE Transactions on Information Forensics and Security.
[25] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2007, ISIT.
[26] Shihao Yan,et al. Artificial Noise: Transmission Optimization in Multi-Input Single-Output Wiretap Channels , 2015, IEEE Transactions on Communications.
[27] Yueming Cai,et al. Secrecy Outage Analysis of Buffer-Aided Cooperative MIMO Relaying Systems , 2018, IEEE Transactions on Vehicular Technology.
[28] Cheng Huang,et al. PTRS: A privacy-preserving trust-based relay selection scheme in VANETs , 2016, Peer-to-Peer Networking and Applications.
[29] Matthew R. McKay,et al. On the Design of Artificial-Noise-Aided Secure Multi-Antenna Transmission in Slow Fading Channels , 2012, IEEE Transactions on Vehicular Technology.
[30] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[31] Yueming Cai,et al. Secrecy outage analysis of buffer-aided multi-antenna relay systems without eavesdropper's CSI , 2017, 2017 IEEE International Conference on Communications (ICC).
[32] R. K. Bunkar,et al. Data Security and Privacy Protection Issues in Cloud Computing , 2014 .
[33] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[34] Javier López,et al. Relay selection for secure 5G green communications , 2015, Telecommun. Syst..
[35] Naofal Al-Dhahir,et al. Enhancing the PHY-Layer Security of MIMO Buffer-Aided Relay Networks , 2016, IEEE Wireless Communications Letters.
[36] Naofal Al-Dhahir,et al. Physical-Layer Security of a Buffer-Aided Full-Duplex Relaying System , 2016, IEEE Communications Letters.
[37] Kah Chan Teh,et al. Buffer State Based Relay Selection for Buffer-Aided Cooperative Relaying Systems , 2015, IEEE Transactions on Wireless Communications.
[38] Vijay K. Bhargava,et al. Diversity and Delay Analysis of Buffer-Aided BICM-OFDM Relaying , 2013, IEEE Transactions on Wireless Communications.
[39] John S. Thompson,et al. Buffer-Aided Relay Selection for Cooperative Diversity Systems without Delay Constraints , 2012, IEEE Transactions on Wireless Communications.
[40] Tony Q. S. Quek,et al. Physical-Layer Secret Key Generation With Colluding Untrusted Relays , 2016, IEEE Transactions on Wireless Communications.
[41] Yuping Zhao,et al. Delay Sensitive Communications over Cognitive Radio Networks , 2012, IEEE Transactions on Wireless Communications.