Percolation on the information theoretic secure SINR graph: Upper and lower bounds
暂无分享,去创建一个
[1] M. Penrose. On a continuum percolation model , 1991, Advances in Applied Probability.
[2] Rahul Vaze. Percolation and connectivity on the signal to interference ratio graph , 2012, 2012 Proceedings IEEE INFOCOM.
[3] Onur Ozan Koyluoglu,et al. On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Transactions on Information Theory.
[4] Kin K. Leung,et al. Artificial Noise Generation from Cooperative Relays for Everlasting Secrecy in Two-Hop Wireless Networks , 2011, IEEE Journal on Selected Areas in Communications.
[5] Martin Haenggi,et al. Secrecy coverage , 2010, 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers.
[6] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[7] R. Durrett. Probability: Theory and Examples , 1993 .
[8] Mathew D. Penrose,et al. Random Geometric Graphs , 2003 .
[9] P. Thiran,et al. Percolation in the signal to interference ratio graph , 2006, Journal of Applied Probability.
[10] Martin Haenggi. The secrecy graph and some of its properties , 2008, 2008 IEEE International Symposium on Information Theory.
[11] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[12] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[13] Moe Z. Win,et al. Percolation and Connectivity in the Intrinsically Secure Communications Graph , 2012, IEEE Transactions on Information Theory.
[14] François Baccelli,et al. Impact of interferences on connectivity in ad hoc networks , 2005, IEEE/ACM Transactions on Networking.
[15] Donald F. Towsley,et al. Physical layer security from inter-session interference in large wireless networks , 2012, 2012 Proceedings IEEE INFOCOM.
[16] Isaac Balberg. Continuum Percolation , 2009, Encyclopedia of Complexity and Systems Science.
[17] A. Robert Calderbank,et al. The Effect of Eavesdroppers on Network Connectivity: A Secrecy Graph Approach , 2011, IEEE Transactions on Information Forensics and Security.
[18] Massimo Franceschetti,et al. Closing the gap in the capacity of random wireless networks , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[19] David Tse,et al. Fundamentals of Wireless Communication , 2005 .
[20] Piyush Gupta,et al. Critical Power for Asymptotic Connectivity in Wireless Networks , 1999 .
[21] Jean-Baptiste Gouéré,et al. Existence of subcritical regimes in the Poisson Boolean model of continuum percolation , 2006, math/0611369.
[22] Martin Haenggi,et al. Percolation in the secrecy graph , 2013, Discret. Appl. Math..
[23] E. N. Gilbert,et al. Random Plane Networks , 1961 .
[24] David Tse,et al. Mobility increases the capacity of ad hoc wireless networks , 2002, TNET.
[25] Martin Haenggi,et al. Percolation in the secrecy graph , 2011, 2011 Information Theory and Applications Workshop.
[26] Thomas M. Cover,et al. Elements of Information Theory , 2005 .