暂无分享,去创建一个
Simon L. Cotton | David E. Simmons | Nidhi Bhargav | S. Cotton | D. Simmons | N. Bhargav | Nidhi Bhargav
[1] Miguel R. D. Rodrigues,et al. Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.
[2] Xian Liu,et al. Probability of Strictly Positive Secrecy Capacity of the Rician-Rician Fading Channel , 2013, IEEE Wireless Communications Letters.
[3] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[4] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.
[5] Olav Tirkkonen,et al. Laplace Transform of Product of Generalized Marcum Q, Bessel I, and Power Functions With Applications , 2014, IEEE Transactions on Signal Processing.
[6] Matthew R. McKay,et al. On the Equivalence Between Interference and Eavesdropping in Wireless Communications , 2014, IEEE Transactions on Vehicular Technology.
[7] T. MacRobert. Higher Transcendental Functions , 1955, Nature.
[8] George K. Karagiannidis,et al. Analytic Expressions and Bounds for Special Functions and Applications in Communication Theory , 2014, IEEE Transactions on Information Theory.
[9] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[10] Simon L. Cotton,et al. Human Body Shadowing in Cellular Device-to-Device Communications: Channel Modeling Using the Shadowed $\kappa-\mu$ Fading Model , 2015, IEEE Journal on Selected Areas in Communications.
[11] Xian Liu,et al. Secrecy capacity of wireless links subject to log-normal fading , 2012, 7th International Conference on Communications and Networking in China.
[12] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[13] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[14] Kerstin Vogler,et al. Table Of Integrals Series And Products , 2016 .
[15] Oluwatobi Olabiyi,et al. Unified analysis of energy detection of unknown signals over generalized fading channels , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.
[16] Roy D. Yates,et al. Secrecy capacity of independent parallel channels , 2009 .
[17] Mandy Eberhart,et al. Digital Communication Over Fading Channels , 2016 .
[18] Shlomo Shamai,et al. Secrecy Capacity Region of Fading Broadcast Channels , 2007, 2007 IEEE International Symposium on Information Theory.
[19] A. Erdélyi,et al. Higher Transcendental Functions , 1954 .
[20] Richard E. Blahut,et al. Secrecy capacity of SIMO and slow fading channels , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..
[21] Simon L. Cotton,et al. Indoor channel characterisation for a wearable antenna array at 868 MHz , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..
[22] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[23] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[24] M.D. Yacoub,et al. The κ-μ distribution and the η-μ distribution , 2007, IEEE Antennas and Propagation Magazine.
[25] Jorge J. Moré,et al. Computing a Trust Region Step , 1983 .
[26] W.G. Scanlon,et al. Characterization and Modeling of the Indoor Radio Channel at 868 MHz for a Mobile Bodyworn Wireless Personal Area Network , 2007, IEEE Antennas and Wireless Propagation Letters.
[27] Simon L. Cotton,et al. An experimental investigation into the influence of user state and environment on fading characteristics in wireless body area networks at 2.45 GHz , 2009, IEEE Transactions on Wireless Communications.
[28] Ender Tekin,et al. The Gaussian Multiple Access Wire-Tap Channel , 2006, IEEE Transactions on Information Theory.
[29] Xian Liu,et al. Probability of strictly positive secrecy capacity of the Weibull fading channel , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).
[30] Shlomo Shamai,et al. Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.
[31] Tharmalingam Ratnarajah,et al. On the Secrecy Mutual Information of Nakagami-m Fading SIMO Channel , 2010, 2010 IEEE International Conference on Communications.
[32] Joseph Lipka,et al. A Table of Integrals , 2010 .
[33] Guanding Yu,et al. On the Secrecy Capacity of Fading Wireless Channel with Multiple Eavesdroppers , 2007, 2007 IEEE International Symposium on Information Theory.
[34] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[35] Mathini Sellathurai,et al. Secrecy capacity of Nakagami-m fading wireless channels in the presence of multiple eavesdroppers , 2009, 2009 Conference Record of the Forty-Third Asilomar Conference on Signals, Systems and Computers.
[36] R. Price,et al. Some non-central F-distributions expressed in closed form , 1964 .
[37] J. Boutros,et al. On communication over fading channels , 1996, Proceedings of ICUPC - 5th International Conference on Universal Personal Communications.
[38] Ueli Maurer,et al. Secret key agreement by public discussion , 1993 .