Cooperative Jamming in a Two-Hop Relay Wireless Network with Buffer-Aided Relays
暂无分享,去创建一个
[1] Rodney A. Kennedy,et al. Cooperative jamming for secrecy in decentralized wireless networks , 2012, 2012 IEEE International Conference on Communications (ICC).
[2] Zhi Chen,et al. Max-Ratio Relay Selection in Secure Buffer-Aided Cooperative Wireless Networks , 2014, IEEE Transactions on Information Forensics and Security.
[3] Xiang Cheng,et al. Relay Selection in Full-Duplex Energy-Harvesting Two-Way Relay Networks , 2017, IEEE Transactions on Green Communications and Networking.
[4] Victor C. M. Leung,et al. Secure Resource Allocation for OFDMA Two-Way Relay Wireless Sensor Networks Without and With Cooperative Jamming , 2016, IEEE Transactions on Industrial Informatics.
[5] Feifei Gao,et al. Zero-forcing beamforming for physical layer security of energy harvesting wireless communications , 2015, EURASIP Journal on Wireless Communications and Networking.
[6] Wen-Zhan Song,et al. Coprime array adaptive beamforming based on compressive sensing virtual array signal , 2016, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[7] George K. Karagiannidis,et al. Secure Communications With Cooperative Jamming: Optimal Power Allocation and Secrecy Outage Analysis , 2017, IEEE Transactions on Vehicular Technology.
[8] Matthew R. McKay,et al. Rethinking the Secrecy Outage Formulation: A Secure Transmission Design Perspective , 2011, IEEE Communications Letters.
[9] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[10] Rodrigo C. de Lamare,et al. Study of Relay Selection for Physical-Layer Security in Buffer-Aided Relay Networks Based on the Secrecy Rate Criterion , 2016, ArXiv.
[11] Hua Wang,et al. Code-Aided Joint Carrier Phase Estimation and Ambiguity Resolution for APSK Signals , 2016, 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring).
[12] Hai Jiang,et al. Optimal Relay Selection for Secure Cooperative Communications With an Adaptive Eavesdropper , 2017, IEEE Transactions on Wireless Communications.
[13] A. Lee Swindlehurst,et al. Buffer-Aided Relaying for Two-Hop Secure Communication , 2015, IEEE Transactions on Wireless Communications.
[14] Hong Wen,et al. Achieving Secure Communications over Wiretap Channels via Security Codes from Resilient Functions , 2014, IEEE Wireless Communications Letters.
[15] Huiming Wang,et al. Secrecy rate maximization for SIMO wiretap channel with uncoordinated cooperative jamming under secrecy outage probability constraint , 2016, 2016 IEEE Wireless Communications and Networking Conference.
[16] Peter W. Shor,et al. Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[17] Hien Quoc Ngo,et al. Secure 5G Wireless Communications: A Joint Relay Selection and Wireless Power Transfer Approach , 2016, IEEE Access.
[18] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[19] Naofal Al-Dhahir,et al. Enhancing the PHY-Layer Security of MIMO Buffer-Aided Relay Networks , 2016, IEEE Wireless Communications Letters.
[20] Naofal Al-Dhahir,et al. Physical-Layer Security of a Buffer-Aided Full-Duplex Relaying System , 2016, IEEE Communications Letters.
[21] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[22] Hsiao-Chun Wu,et al. Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.
[23] Gonzalo Seco-Granados,et al. Opportunistic relay selection with outdated CSI: outage probability and diversity analysis , 2009, IEEE Transactions on Wireless Communications.
[24] Ioannis Krikidis,et al. Opportunistic relay selection for cooperative networks with secrecy constraints , 2010, IET Commun..