Buffer-Aided Relaying for Two-Hop Secure Communication with Limited Packet Lifetime
暂无分享,去创建一个
Xiaohong Jiang | Yang Xu | Jia Liu | Ji He
[1] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[2] Naofal Al-Dhahir,et al. Enhancing the PHY-Layer Security of MIMO Buffer-Aided Relay Networks , 2016, IEEE Wireless Communications Letters.
[3] Naofal Al-Dhahir,et al. Physical-Layer Security of a Buffer-Aided Full-Duplex Relaying System , 2016, IEEE Communications Letters.
[4] Matthieu R. Bloch,et al. Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security , 2013, IEEE Signal Processing Magazine.
[5] Deli Qiao,et al. Buffer-Aided Two-Hop Secure Communications With Power Control and Link Selection , 2018, IEEE Transactions on Wireless Communications.
[6] Xiaohong Jiang,et al. Secure Communication in Non-Geostationary Orbit Satellite Systems: A Physical Layer Security Perspective , 2019, IEEE Access.
[7] Hesham El Gamal,et al. The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.
[8] Zhi Chen,et al. Max-Ratio Relay Selection in Secure Buffer-Aided Cooperative Wireless Networks , 2014, IEEE Transactions on Information Forensics and Security.
[9] H. Vincent Poor,et al. The Gaussian wiretap channel with a helping interferer , 2008, 2008 IEEE International Symposium on Information Theory.
[10] Yueming Cai,et al. Secrecy Outage Analysis of Buffer-Aided Cooperative MIMO Relaying Systems , 2018, IEEE Transactions on Vehicular Technology.
[11] Navrati Saxena,et al. Next Generation 5G Wireless Networks: A Comprehensive Survey , 2016, IEEE Communications Surveys & Tutorials.
[12] Shinya Sugiura,et al. Physical Layer Security in Buffer-State-Based Max-Ratio Relay Selection Exploiting Broadcasting With Cooperative Beamforming and Jamming , 2019, IEEE Transactions on Information Forensics and Security.
[13] Jia Liu,et al. Secure and Energy-Efficient Beamforming for MIMO Two-way Untrusted Relay Systems , 2019, 2019 IEEE Wireless Communications and Networking Conference (WCNC).
[14] Richard E. Blahut,et al. Secrecy capacity of SIMO and slow fading channels , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..
[15] Zhiguo Ding,et al. A General Relaying Transmission Protocol for MIMO Secrecy Communications , 2012, IEEE Transactions on Communications.
[16] H. A. David,et al. Order Statistics (2nd ed). , 1981 .
[17] Yulong Shen,et al. Transmission protocol for secure big data in two-hop wireless networks with cooperative jamming , 2014, Inf. Sci..
[18] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[19] Deli Qiao,et al. Statistical Delay Tradeoffs in Buffer-Aided Two-Hop Wireless Communication Systems , 2016, IEEE Transactions on Communications.
[20] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[21] A. Lee Swindlehurst,et al. Buffer-Aided Relaying for Two-Hop Secure Communication , 2015, IEEE Transactions on Wireless Communications.