Distributed Matching Algorithms: Maximizing Secrecy in the Presence of Untrusted Relay
暂无分享,去创建一个
[1] Aylin Yener,et al. Multi-terminal networks with an untrusted relay , 2014, 2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[2] Kai-Kit Wong,et al. To Harvest and Jam: A Paradigm of Self-Sustaining Friendly Jammers for Secure AF Relaying , 2015, IEEE Transactions on Signal Processing.
[3] Wenyu Luo,et al. A tractable approach to analyzing the physical-layer security in K-tier heterogeneous cellular networks , 2015 .
[4] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[5] Lajos Hanzo,et al. Pragmatic Distributed Algorithm for Spectral Access in Cooperative Cognitive Radio Networks , 2014, IEEE Transactions on Communications.
[6] Peng Ning,et al. No time to demodulate - fast physical layer verification of friendly jamming , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.
[7] Ivan Martinovic,et al. Friendly Jamming on Access Points: Analysis and Real-World Measurements , 2016, IEEE Transactions on Wireless Communications.
[8] Lajos Hanzo,et al. On the MIMO channel capacity of multidimensional signal sets , 2006, IEEE Transactions on Vehicular Technology.
[9] Dongtang Ma,et al. Destination-Aided Cooperative Jamming for Dual-Hop Amplify-and-Forward MIMO Untrusted Relay Systems , 2016, IEEE Transactions on Vehicular Technology.
[10] Wang Baoyun,et al. Coalition formation game of dual-identity nodes for improving PHY security of wireless networks , 2015, The 27th Chinese Control and Decision Conference (2015 CCDC).
[11] Amitav Mukherjee,et al. Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.
[12] Aylin Yener,et al. Improving Secrecy Rate via Spectrum Leasing for Friendly Jamming , 2013, IEEE Transactions on Wireless Communications.
[13] Marwan Krunz,et al. Supporting PHY-Layer Security in Multi-Link Wireless Networks Using Friendly Jamming , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).
[14] Lifeng Wang,et al. Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.
[15] Donald F. Towsley,et al. Physical Layer Security in Heterogeneous Cellular Networks , 2016, IEEE Transactions on Communications.
[16] Branka Vucetic,et al. Dynamic decentralised algorithms for cognitive radio relay networks with multiple primary and secondary users utilising matching theory , 2013, Trans. Emerg. Telecommun. Technol..
[17] Xiang Zhang,et al. Partner Selection and Incentive Mechanism for Physical Layer Security , 2015, IEEE Transactions on Wireless Communications.
[18] An Wang,et al. Power allocation based on Stackelberg game in a jammer-assisted secure network , 2013 .
[19] Farshad Lahouti,et al. Link Adaptation with Untrusted Relay Assignment: Design and Performance Analysis , 2013, IEEE Transactions on Communications.
[20] Lajos Hanzo,et al. Self-Concatenated Code Design and its Application in Power-Efficient Cooperative Communications , 2012, IEEE Communications Surveys & Tutorials.
[21] Adrish Banerjee,et al. Secure Communication via a Wireless Energy Harvesting Untrusted Relay , 2015, IEEE Transactions on Vehicular Technology.
[22] Aylin Yener,et al. The two-hop interference untrusted-relay channel with confidential messages , 2015, 2015 IEEE Information Theory Workshop - Fall (ITW).
[23] Aylin Yener,et al. Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.