Secrecy games in cognitive radio networks with multiple secondary users
暂无分享,去创建一个
[1] Aylin Yener,et al. Improving Secrecy Rate via Spectrum Leasing for Friendly Jamming , 2013, IEEE Transactions on Wireless Communications.
[2] Carles Padró,et al. Information Theoretic Security , 2013, Lecture Notes in Computer Science.
[3] Frederic Gabry,et al. Secrecy in Cognitive Radio Networks , 2014 .
[4] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[5] Joseph Mitola,et al. Cognitive Radio An Integrated Agent Architecture for Software Defined Radio , 2000 .
[6] Athanasios V. Vasilakos,et al. A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.
[7] K. J. Ray Liu,et al. An Information Secrecy Game in Cognitive Radio Networks , 2011, IEEE Transactions on Information Forensics and Security.
[8] Mikael Skoglund,et al. On the Optimization of the Secondary Transmitter's Strategy in Cognitive Radio Channels with Secrecy , 2014, IEEE Journal on Selected Areas in Communications.
[9] Shlomo Shamai,et al. Capacity of Cognitive Interference Channels With and Without Secrecy , 2009, IEEE Transactions on Information Theory.
[10] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[11] H. Vincent Poor,et al. Interference Assisted Secret Communication , 2008, IEEE Transactions on Information Theory.