Opportunistic Selection for Decode-and-Forward Cooperative Networks with Secure Probabilistic Constraints
暂无分享,去创建一个
[1] Hong Man,et al. Maximal Ratio Diversity Combining Enhanced Security , 2011, IEEE Communications Letters.
[2] Xiaodai Dong,et al. MIMO Relaying Broadcast Channels With Linear Precoding and Quantized Channel State Information Feedback , 2010, IEEE Transactions on Signal Processing.
[3] Xiaodai Dong,et al. Joint Precoding Optimization for Multiuser Multi-Antenna Relaying Downlinks Using Quadratic Programming , 2011, IEEE Transactions on Communications.
[4] Yawgeng A. Chau,et al. Channel statistics and performance of cooperative selection diversity with dual-hop amplify-and-forward relay over Rayleigh fading channels , 2008, IEEE Transactions on Wireless Communications.
[5] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2007, ISIT.
[6] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[7] Hesham El Gamal,et al. The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.
[8] Gerhard Fettweis,et al. Relay-based deployment concepts for wireless and mobile broadband radio , 2004, IEEE Communications Magazine.
[9] Aylin Yener,et al. Two-Hop Secure Communication Using an Untrusted Relay , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[10] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[11] John S. Thompson,et al. Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.
[12] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[13] Xiaodai Dong,et al. Joint Optimization for Source and Relay Precoding under Multiuser MIMO Downlink Channels , 2010, 2010 IEEE International Conference on Communications.
[14] Jiaheng Wang,et al. Performance of Secure Communications Over Correlated Fading Channels , 2012, IEEE Signal Processing Letters.
[15] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[16] John G. Proakis,et al. Digital Communications , 1983 .
[17] Matthew R. McKay,et al. Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.
[18] Z. Jane Wang,et al. Closed-Form BER Analysis of Non-Coherent FSK in MISO Double Rayleigh Fading/RFID Channel , 2011, IEEE Communications Letters.
[19] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[20] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[21] Yasutada Oohama,et al. Capacity Theorems for Relay Channels with Confidential Messages , 2007, 2007 IEEE International Symposium on Information Theory.
[22] I. S. Gradshteyn,et al. Table of Integrals, Series, and Products , 1976 .
[23] Ioannis Krikidis,et al. Opportunistic relay selection for cooperative networks with secrecy constraints , 2010, IET Commun..
[24] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.