Physical Layer Security of a Multiantenna-Based CR Network With Single and Multiple Primary Users
暂无分享,去创建一个
[1] Shlomo Shamai,et al. Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.
[2] Aria Nosratinia,et al. Asymptotic capacity analysis of transmit antenna selection , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[3] Iain B. Collings,et al. Transmit Antenna Selection for Security Enhancement in MIMO Wiretap Channels , 2013, IEEE Transactions on Communications.
[4] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[5] K. J. Ray Liu,et al. An Information Secrecy Game in Cognitive Radio Networks , 2011, IEEE Transactions on Information Forensics and Security.
[6] Zhu Han,et al. Secure wireless communications via cooperation , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[7] H. Vincent Poor,et al. Cooperative Energy Harvesting Networks With Spatially Random Users , 2013, IEEE Signal Processing Letters.
[8] Yasutada Oohama,et al. Coding for relay channels with confidential messages , 2001, Proceedings 2001 IEEE Information Theory Workshop (Cat. No.01EX494).
[9] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.
[10] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[11] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[12] Xuelong Li,et al. Secrecy Outage and Diversity Analysis of Cognitive Radio Systems , 2014, IEEE Journal on Selected Areas in Communications.
[13] S. El-Rabaie,et al. Proposed relay selection scheme for physical layer security in Cognitive Radio networks , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).
[14] Sennur Ulukus,et al. Wireless Physical-Layer Security: Lessons Learned From Information Theory , 2015, Proceedings of the IEEE.
[15] Yiyang Pei,et al. Secure communication over MISO cognitive radio channels , 2010, IEEE Transactions on Wireless Communications.
[16] Aylin Yener,et al. Improving Secrecy Rate via Spectrum Leasing for Friendly Jamming , 2013, IEEE Transactions on Wireless Communications.
[17] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2007, ISIT.
[18] Aarnout Brombacher,et al. Probability... , 2009, Qual. Reliab. Eng. Int..
[19] Jeffrey G. Andrews,et al. Outage Probability of Cognitive Relay Networks with Interference Constraints , 2011, IEEE Transactions on Wireless Communications.
[20] Hesham El Gamal,et al. Cooperative Secrecy: The Relay-Eavesdropper Channel , 2007, 2007 IEEE International Symposium on Information Theory.
[21] S. El-Rabaie,et al. Proposed relay selection scheme for physical layer security in cognitive radio networks , 2012, IET Commun..
[22] Aria Nosratinia,et al. Antenna selection in MIMO systems , 2004, IEEE Communications Magazine.
[23] Il-Min Kim,et al. Secure communications with untrusted secondary users in cognitive radio networks , 2014, 2012 IEEE Global Communications Conference (GLOBECOM).
[24] Gregory W. Wornell,et al. The MIMOME Channel , 2007, ArXiv.
[25] Xianbin Wang,et al. Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.
[26] Athanasios Papoulis,et al. Probability, Random Variables and Stochastic Processes , 1965 .
[27] Hong Man,et al. Maximal Ratio Diversity Combining Enhanced Security , 2011, IEEE Communications Letters.
[28] Xianbin Wang,et al. Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks , 2013, IEEE Transactions on Communications.
[29] Yiyang Pei,et al. Secure Communication in Multiantenna Cognitive Radio Networks With Imperfect Channel State Information , 2011, IEEE Transactions on Signal Processing.
[30] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[31] Shamik Sengupta,et al. Analysis of Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks , 2011, IEEE Journal on Selected Areas in Communications.
[32] Jung-Min Park,et al. Ensuring Trustworthy Spectrum Sensing in Cognitive Radio Networks , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.
[33] Mustafa Cenk Gursoy,et al. Secure relay beamforming over cognitive radio channels , 2011, 2011 45th Annual Conference on Information Sciences and Systems.
[34] Guanding Yu,et al. On the Secrecy Capacity of Fading Wireless Channel with Multiple Eavesdroppers , 2007, 2007 IEEE International Symposium on Information Theory.
[35] Kyung Seung Ahn,et al. Secrecy Performance of Maximum Ratio Diversity With Channel Estimation Error , 2015, IEEE Signal Processing Letters.
[36] Shlomo Shamai,et al. A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.
[37] Mohamed-Slim Alouini,et al. Digital Communication over Fading Channels: Simon/Digital Communications 2e , 2004 .
[38] Miguel R. D. Rodrigues,et al. On Wireless Channels With ${M}$-Antenna Eavesdroppers: Characterization of the Outage Probability and $\varepsilon $-Outage Secrecy Capacity , 2011, IEEE Transactions on Information Forensics and Security.
[39] Hsiao-Hwa Chen,et al. A Survey on Multiple-Antenna Techniques for Physical Layer Security , 2017, IEEE Communications Surveys & Tutorials.
[40] Liuqing Yang,et al. Securing physical-layer communications for cognitive radio networks , 2015, IEEE Communications Magazine.
[41] George K. Karagiannidis,et al. On the Security of Cognitive Radio Networks , 2015, IEEE Transactions on Vehicular Technology.
[42] Ranjan K. Mallik,et al. Cognitive MIMO Relay Networks With Generalized Selection Combining , 2014, IEEE Transactions on Wireless Communications.
[43] M. Yuksel,et al. Secure Communication with a Relay Helping the Wire-tapper , 2007, 2007 IEEE Information Theory Workshop.