Towards achieving full secrecy rate in wireless networks: A control theoretic approach
暂无分享,去创建一个
[1] Ness B. Shroff,et al. Joint Power and Secret Key Queue Management for Delay Limited Secure Communication , 2010, 2010 Proceedings IEEE INFOCOM.
[2] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[3] Elza Erkip,et al. A Secure Communication Game With a Relay Helping the Eavesdropper , 2009, IEEE Transactions on Information Forensics and Security.
[4] Sennur Ulukus,et al. The Secrecy Capacity Region of the Gaussian MIMO Multi-Receiver Wiretap Channel , 2009, IEEE Transactions on Information Theory.
[5] Özgür Erçetin,et al. Control of Wireless Networks With Secrecy , 2010, IEEE/ACM Transactions on Networking.
[6] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[7] Donald F. Towsley,et al. Security-capacity trade-off in large wireless networks using keyless secrecy , 2010, MobiHoc '10.
[8] Ness B. Shroff,et al. Resource Allocation in Sensor Networks with Renewable Energy , 2010, 2010 Proceedings of 19th International Conference on Computer Communications and Networks.
[9] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2007, ISIT.
[10] Martin Haenggi,et al. Secrecy coverage , 2010, 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers.
[11] Miguel R. D. Rodrigues,et al. Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.
[12] Can Emre Koksal,et al. On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Trans. Inf. Theory.
[13] C. Emre Koksal,et al. On the effect of colluding eavesdroppers on secrecy capacity scaling , 2010, 2010 European Wireless Conference (EW).
[14] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[15] Alexander L. Stolyar,et al. Greedy primal-dual algorithm for dynamic resource allocation in complex networks , 2006, Queueing Syst. Theory Appl..
[16] A. Robert Calderbank,et al. Modeling location uncertainty for eavesdroppers: A secrecy graph approach , 2010, 2010 IEEE International Symposium on Information Theory.
[17] C. Emre Koksal,et al. On the Effect of Colluding Eavesdroppers on Secrecy Scaling , 2009 .
[18] Shlomo Shamai,et al. Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.
[19] Leandros Tassiulas,et al. Jointly optimal routing and scheduling in packet radio networks , 1992, IEEE Trans. Inf. Theory.
[20] Moustafa Youssef,et al. On the delay limited secrecy capacity of fading channels , 2009, 2009 IEEE International Symposium on Information Theory.
[21] Michael J. Neely. Energy Optimal Control for Time-Varying Wireless Networks , 2006, IEEE Trans. Inf. Theory.
[22] H. Vincent Poor,et al. Secret communication with feedback , 2008, 2008 International Symposium on Information Theory and Its Applications.
[23] Ness B. Shroff,et al. A framework for opportunistic scheduling in wireless networks , 2003, Comput. Networks.