Secrecy Outage in MISO Systems With Partial Channel Information
暂无分享,去创建一个
Eduard A. Jorswieck | Sabrina Gerbracht | Christian Scheunert | Eduard Axel Jorswieck | Sabrina Gerbracht | Christian Scheunert
[1] Nan Liu,et al. Towards the Secrecy Capacity of the Gaussian MIMO Wire-Tap Channel: The 2-2-1 Channel , 2007, IEEE Transactions on Information Theory.
[2] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[3] Matthew R. McKay,et al. Physical layer security with artificial noise: Secrecy capacity and optimal power allocation , 2009, 2009 3rd International Conference on Signal Processing and Communication Systems.
[4] Holger Boche,et al. Majorization and Matrix-Monotone Functions in Wireless Communications , 2007, Found. Trends Commun. Inf. Theory.
[5] Miguel R. D. Rodrigues,et al. Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.
[6] Ruoheng Liu,et al. Securing Wireless Communications at the Physical Layer , 2014 .
[7] J. Norris. Appendix: probability and measure , 1997 .
[8] Eduard A. Jorswieck,et al. Secrecy Rate Region of MISO Interference Channel : Pareto Boundary and Non-Cooperative Games , 2009 .
[9] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[10] Chong-Yung Chi,et al. On the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise: The Noise Leakage Problem , 2009, IEEE Transactions on Wireless Communications.
[11] Amir K. Khandani,et al. The Secrecy Capacity Region of the Gaussian MIMO Broadcast Channel , 2009, IEEE Transactions on Information Theory.
[12] A. Lee Swindlehurst,et al. Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.
[13] Mustafa Cenk Gursoy. Secure communication in the low-SNR regime: A Characterization of the energy-secrecy tradeoff , 2009, 2009 IEEE International Symposium on Information Theory.
[14] Qiang Li,et al. Optimal and Robust Transmit Designs for MISO Channel Secrecy by Semidefinite Programming , 2010, IEEE Transactions on Signal Processing.
[15] Eduard A. Jorswieck,et al. Secrecy on the Physical Layer in Wireless Networks , 2010 .
[16] Shlomo Shamai,et al. Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.
[17] Andrea J. Goldsmith,et al. Capacity limits of MIMO channels , 2003, IEEE J. Sel. Areas Commun..
[18] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[19] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[20] I. Olkin,et al. Inequalities: Theory of Majorization and Its Applications , 1980 .
[21] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[22] Shidong Zhou,et al. On the Monotonicity, Log-Concavity, and Tight Bounds of the Generalized Marcum and Nuttall $Q$-Functions , 2010, IEEE Transactions on Information Theory.
[23] Erik G. Larsson,et al. Complete Characterization of the Pareto Boundary for the MISO Interference Channel , 2008, IEEE Transactions on Signal Processing.
[24] John G. Proakis,et al. Digital Communications , 1983 .
[25] Ingram Olkin,et al. Inequalities: Theory of Majorization and Its Application , 1979 .
[26] R. Negi,et al. Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..
[27] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[28] Elza Erkip,et al. Diversity-multiplexing tradeoff for the multiple-antenna wire-tap channel , 2008, 2008 42nd Annual Conference on Information Sciences and Systems.
[29] Ness B. Shroff,et al. Secrecy outage capacity of fading channels , 2012, 2012 46th Annual Conference on Information Sciences and Systems (CISS).
[30] Richard E. Blahut,et al. Secrecy capacity of SIMO and slow fading channels , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..
[31] Sennur Ulukus,et al. Achievable Rates in Gaussian MISO Channels with Secrecy Constraints , 2007, 2007 IEEE International Symposium on Information Theory.