Detecting Malicious Behavior in Cooperative Diversity
暂无分享,去创建一个
[1] H.T. Sencar,et al. Cooperative diversity in the presence of a misbehaving relay : Performance analysis , 2007, 2007 IEEE Sarnoff Symposium.
[2] Aria Nosratinia,et al. Cooperative communication in wireless networks , 2004, IEEE Communications Magazine.
[3] Thomas M. Cover,et al. Elements of information theory (2. ed.) , 2006 .
[4] Min Wu,et al. Security Issues in Cooperative Communications: Tracing Adversarial Relays , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.
[5] Gerhard Fettweis,et al. On the performance of cooperative diversity protocols in practical wireless systems , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).
[6] J. Hubaux,et al. Cooperative communication in wireless networks , 2004 .
[7] Abbas El Gamal,et al. Capacity theorems for the relay channel , 1979, IEEE Trans. Inf. Theory.
[8] Gregory W. Wornell,et al. Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.
[9] Helmut Bölcskei,et al. Fading relay channels: performance limits and space-time signal design , 2004, IEEE Journal on Selected Areas in Communications.
[10] G. Fettweis,et al. A simple cooperative extension to wireless relaying , 2004, International Zurich Seminar on Communications, 2004.
[11] Elza Erkip,et al. User cooperation diversity. Part I. System description , 2003, IEEE Trans. Commun..
[12] Thomas M. Cover,et al. Elements of Information Theory , 2005 .