Secrecy Analysis of Multi-user Half/Full-Duplex Wireless Bi-directional Relaying Network
暂无分享,去创建一个
[1] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[2] Joan Daemen,et al. AES Proposal : Rijndael , 1998 .
[3] Petar Popovski,et al. Physical-Layer Security With Full-Duplex Transceivers and Multiuser Receiver at Eve , 2017, IEEE Transactions on Communications.
[4] Victor Adamchik,et al. The algorithm for calculating integrals of hypergeometric type functions and its realization in REDUCE system , 1990, ISSAC '90.
[5] Jorge Cabral,et al. Path loss exponent analysis in Wireless Sensor Networks: Experimental evaluation , 2013, 2013 11th IEEE International Conference on Industrial Informatics (INDIN).
[6] Il-Min Kim,et al. Optimal Power Allocation for Secure Multicarrier Relay Systems , 2011, IEEE Transactions on Signal Processing.
[7] Tho Le-Ngoc,et al. Performance of Full-Duplex AF Relaying in the Presence of Residual Self-Interference , 2014, IEEE Journal on Selected Areas in Communications.
[8] D. Rajan. Probability, Random Variables, and Stochastic Processes , 2017 .
[9] Yueming Cai,et al. Secrecy Rates for Relay Selection in OFDMA Networks , 2011, 2011 Third International Conference on Communications and Mobile Computing.
[10] Victor C. M. Leung,et al. Secure Resource Allocation for OFDMA Two-Way Relay Wireless Sensor Networks Without and With Cooperative Jamming , 2016, IEEE Transactions on Industrial Informatics.
[11] Volkan Ozduran. Physical Layer Security of Multi-user Full-Duplex One-Way Wireless Relaying Network , 2018, 2018 Advances in Wireless and Optical Communications (RTUWO).
[12] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[13] Yueming Cai,et al. Resource allocation for physical layer security in cooperative OFDM networks , 2015, 2015 International Conference on Wireless Communications & Signal Processing (WCSP).
[14] Michail Matthaiou,et al. Two-Way AF Relaying in the Presence of Co-Channel Interference , 2013, IEEE Transactions on Communications.
[15] Waqas Aman,et al. Enhancing physical layer security in dual-hop multiuser transmission , 2016, 2016 IEEE Wireless Communications and Networking Conference.
[16] H. Vincent Poor,et al. Application of Non-Orthogonal Multiple Access in LTE and 5G Networks , 2015, IEEE Communications Magazine.
[17] Ehsan Soleimani-Nasab,et al. Opportunistic source-pair selection for multi-user two-way amplify-and-forward wireless relaying networks , 2016, IET Commun..
[18] Derrick Wing Kwan Ng,et al. Secure Resource Allocation and Scheduling for OFDMA Decode-and-Forward Relay Networks , 2011, IEEE Transactions on Wireless Communications.