Secure M-PSK communication via directional modulation
暂无分享,去创建一个
[1] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[2] Wenbo Wang,et al. Secrecy Capacity Enhancement With Distributed Precoding in Multirelay Wiretap Systems , 2013, IEEE Transactions on Information Forensics and Security.
[3] B. Hassibi,et al. The MIMO wiretap channel , 2008, 2008 3rd International Symposium on Communications, Control and Signal Processing.
[4] Erica L. Daly,et al. Demonstration of Directional Modulation Using a Phased Array , 2010, IEEE Transactions on Antennas and Propagation.
[5] Arsenia Chorti. Helping interferer physical layer security strategies for M-QAM and M-PSK systems , 2012, 2012 46th Annual Conference on Information Sciences and Systems (CISS).
[6] Roy D. Yates,et al. Secret Communication via Multi-antenna Transmission , 2007, 2007 41st Annual Conference on Information Sciences and Systems.
[7] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[8] Elza Erkip,et al. A Secure Communication Game With a Relay Helping the Eavesdropper , 2009, IEEE Transactions on Information Forensics and Security.
[9] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[10] Robert W. Heath,et al. Antenna Subset Modulation for secure millimeter-wave wireless communication , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).
[11] Jochen Schiller,et al. Mobile Communications , 1996, IFIP — The International Federation for Information Processing.
[12] Zhu Han,et al. Secrecy Analysis on Network Coding in Bidirectional Multibeam Satellite Communications , 2015, IEEE Transactions on Information Forensics and Security.
[13] Vijay K. Madisetti,et al. The Digital Signal Processing Handbook , 1997 .
[14] Christos Masouros,et al. Exploiting Known Interference as Green Signal Power for Downlink Beamforming Optimization , 2015, IEEE Transactions on Signal Processing.
[15] Zhu Han,et al. Improved Wireless Secrecy Rate Using Distributed Auction Theory , 2009, 2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks.
[16] Symeon Chatzinotas,et al. Constructive Multiuser Interference in Symbol Level Precoding for the MISO Downlink Channel , 2014, IEEE Transactions on Signal Processing.
[17] Zhi Ding,et al. On Secrecy Rate Analysis of MIMO Wiretap Channels Driven by Finite-Alphabet Input , 2011, IEEE Transactions on Communications.
[18] Nathaniel E. Helwig,et al. An Introduction to Linear Algebra , 2006 .
[19] Raghuraman Mudumbai,et al. A new jamming technique for secrecy in multi-antenna wireless networks , 2010, 2010 IEEE International Symposium on Information Theory.
[20] Zhu Han,et al. Physical Layer Security for Two Way Relay Communications with Friendly Jammers , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[21] A. Lee Swindlehurst,et al. Secure Communications via Cooperative Jamming in Two-Hop Relay Systems , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[22] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[23] Xiaohua Li,et al. Using Antenna Array Redundancy and Channel Diversity for Secure Wireless Transmissions , 2007, J. Commun..
[24] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.
[25] Shlomo Shamai,et al. A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.
[26] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[27] A. Robert Calderbank,et al. MIMO Wireless Communications , 2007 .
[28] Symeon Chatzinotas,et al. Joint Power Control in Wiretap Interference Channels , 2014, IEEE Transactions on Wireless Communications.
[29] M. Daly,et al. Directional Modulation Technique for Phased Arrays , 2009, IEEE Transactions on Antennas and Propagation.
[30] Joong Soo Ma,et al. Mobile Communications , 2003, Lecture Notes in Computer Science.
[31] Ross D. Murch,et al. A transmit preprocessing technique for multiuser MIMO systems using a decomposition approach , 2004, IEEE Transactions on Wireless Communications.