Secrecy Analysis in Wireless Network With Passive Eavesdroppers by Using Partial Cooperation
暂无分享,去创建一个
[1] Helmut Bölcskei,et al. Capacity scaling laws in MIMO relay networks , 2006, IEEE Transactions on Wireless Communications.
[2] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2007, ISIT.
[3] George K. Karagiannidis,et al. Secure Communications With Cooperative Jamming: Optimal Power Allocation and Secrecy Outage Analysis , 2017, IEEE Transactions on Vehicular Technology.
[4] Mohamed-Slim Alouini,et al. Power allocation and cooperative jamming for enhancing physical layer security in opportunistic relay networks in the presence of interference , 2017, Trans. Emerg. Telecommun. Technol..
[5] Hsiao-Hwa Chen,et al. A Survey on Multiple-Antenna Techniques for Physical Layer Security , 2017, IEEE Communications Surveys & Tutorials.
[6] Il-Min Kim,et al. Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.
[7] Aylin Yener,et al. Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.
[8] Claudio Valencia Cordero,et al. Towards physical layer security systems design using game theory approaches , 2017, 2017 CHILEAN Conference on Electrical, Electronics Engineering, Information and Communication Technologies (CHILECON).
[9] Georges Kaddoum,et al. A Survey on Cooperative Jamming Applied to Physical Layer Security , 2015, 2015 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB).
[10] Huiming Wang,et al. Enhancing wireless secrecy via cooperation: signal design and optimization , 2015, IEEE Communications Magazine.
[11] Huiming Wang,et al. Joint Cooperative Beamforming and Jamming to Secure AF Relay Systems With Individual Power Constraint and No Eavesdropper's CSI , 2013, IEEE Signal Processing Letters.
[12] Jia Zhu,et al. Joint Cooperative Beamforming and Jamming for Physical-Layer Security of Decode-and-Forward Relay Networks , 2017, IEEE Access.
[13] Mazen O. Hasna,et al. Performance analysis of secure AF relay networks using cooperative jamming under outdated CSI , 2017, IET Commun..
[14] Huiming Wang,et al. Robust Joint Beamforming and Jamming for Secure AF Networks: Low-Complexity Design , 2015, IEEE Transactions on Vehicular Technology.
[15] A. Goldsmith,et al. Capacity of Rayleigh fading channels under different adaptive transmission and diversity-combining techniques , 1999, IEEE Transactions on Vehicular Technology.
[16] Hyun-Ho Choi,et al. Adaptive Wireless-Powered Relaying Schemes With Cooperative Jamming for Two-Hop Secure Communication , 2018, IEEE Internet of Things Journal.
[17] Georges Kaddoum,et al. Secrecy Capacity Scaling With Untrustworthy Aggressive Relays Cooperating With a Wire-Tapper , 2016, IEEE Wireless Communications Letters.
[18] Jaesung Lim,et al. Capacity Scaling and Diversity Order for Secure Cooperative Relaying With Untrustworthy Relays , 2015, IEEE Transactions on Wireless Communications.
[19] R. Serfling. Approximation Theorems of Mathematical Statistics , 1980 .
[20] Edward W. Ng,et al. A table of integrals of the exponential integral. , 1969 .
[21] Feng Liu,et al. Joint Cooperative Beamforming, Jamming, and Power Allocation to Secure AF Relay Systems , 2015, IEEE Transactions on Vehicular Technology.