Non-regenerative two-hop wiretap channels using interference neutralization
暂无分享,去创建一个
[1] Hamid Jafarkhani,et al. Cooperative Jamming and Power Allocation for Wireless Relay Networks in Presence of Eavesdropper , 2011, 2011 IEEE International Conference on Communications (ICC).
[2] Hesham El Gamal,et al. The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.
[3] Mikael Skoglund,et al. Outage performances for amplify-and-forward, decode-and-forward and cooperative jamming strategies for the wiretap channel , 2011, 2011 IEEE Wireless Communications and Networking Conference.
[4] A. Lee Swindlehurst,et al. Cooperative Jamming for Secure Communications in MIMO Relay Networks , 2011, IEEE Transactions on Signal Processing.
[5] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[6] Shlomo Shamai,et al. Information Theoretic Security , 2009, Found. Trends Commun. Inf. Theory.
[7] Eduard A. Jorswieck,et al. Secrecy on the Physical Layer in Wireless Networks , 2010 .
[8] Mikael Skoglund,et al. Outage Performance and Power Allocation for Decode-and-Forward Relaying and Cooperative Jamming for the Wiretap Channel , 2011, 2011 IEEE International Conference on Communications Workshops (ICC).
[9] Suhas N. Diggavi,et al. Transmission techniques for relay-interference networks , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[10] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[11] Eduard A. Jorswieck,et al. Instantaneous Relaying: Optimal Strategies and Interference Neutralization , 2012, IEEE Transactions on Signal Processing.
[12] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[13] Stefan Berger,et al. Recent advances in amplify-and-forward two-hop relaying , 2009, IEEE Communications Magazine.
[14] Antonia Maria Tulino,et al. High-SNR power offset in multiantenna communication , 2005, IEEE Transactions on Information Theory.
[15] Matthieu R. Bloch,et al. Physical Layer Security , 2020, Encyclopedia of Wireless Networks.
[16] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.