Physical layer security strategies for downlink heterogeneous cloud radio access networks
暂无分享,去创建一个
[1] Jeffrey G. Andrews,et al. The Guard Zone in Wireless Ad hoc Networks , 2007, IEEE Transactions on Wireless Communications.
[2] Jeffrey G. Andrews,et al. Transmission capacity of wireless ad hoc networks with outage constraints , 2005, IEEE Transactions on Information Theory.
[3] Vera Stavroulaki,et al. 5G on the Horizon: Key Challenges for the Radio-Access Network , 2013, IEEE Vehicular Technology Magazine.
[4] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[5] Xiangyun Zhou,et al. Physical Layer Security in Cellular Networks: A Stochastic Geometry Approach , 2013, IEEE Transactions on Wireless Communications.
[6] A. Lee Swindlehurst,et al. Secure Communications via Cooperative Jamming in Two-Hop Relay Systems , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[7] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[8] Zhu Han,et al. Joint Relay and Jammer Selection for Secure Two-Way Relay Networks , 2011, IEEE Transactions on Information Forensics and Security.
[9] Jeffrey G. Andrews,et al. A new tractable model for cellular coverage , 2010, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[10] Moe Z. Win,et al. Percolation and Connectivity in the Intrinsically Secure Communications Graph , 2012, IEEE Transactions on Information Theory.
[11] Hui Zhao,et al. Joint power allocation and relay selection for decode-and-forward cooperative relay in secure communication , 2013 .
[12] Jeffrey G. Andrews,et al. Stochastic geometry and random graphs for the analysis and design of wireless networks , 2009, IEEE Journal on Selected Areas in Communications.
[13] John S. Thompson,et al. Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.
[14] H. Vincent Poor,et al. Secrecy throughput of MANETs with malicious nodes , 2009, 2009 IEEE International Symposium on Information Theory.
[15] Tony Q. S. Quek,et al. Throughput Optimization, Spectrum Allocation, and Access Control in Two-Tier Femtocell Networks , 2012, IEEE Journal on Selected Areas in Communications.