SecDCF: An Optimized Cross-Layer Scheduling Scheme Based on Physical Layer Security
暂无分享,去创建一个
Yue Wu | Yimeng Zhao | Xudong Wang | Donglai Sun | Xudong Wang | Yue Wu | Donglai Sun | Yimeng Zhao
[1] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[2] Matthew S. Gast. 802.11 Wireless Networks - the Definitive Guide: Creating and Administering Wireless Networks: Covers 802.11a, G, N and I (2nd Ed.) , 2002 .
[3] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[4] Scott D. Lathrop,et al. Wireless security threat taxonomy , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..
[5] G. Simons. Great Expectations: Theory of Optimal Stopping , 1973 .
[6] Lang Tong,et al. Single-user channel estimation and equalization , 2000, IEEE Signal Process. Mag..
[7] David Siegmund,et al. Great expectations: The theory of optimal stopping , 1971 .
[8] Matthew R. McKay,et al. Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.
[9] R. Negi,et al. Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..
[10] Martin Herdegen. Optimal Stopping and Applications Example 2 : American options , 2009 .
[11] Shlomo Shamai,et al. Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.
[12] Wade Trappe,et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.
[13] Ender Tekin,et al. Correction to: "the Gaussian multiple access wire-tap channel" and "the general Gaussian multiple access and two-way wire-tap channels: achievable rates and cooperative jamming" , 2010, IEEE Trans. Inf. Theory.
[14] Junshan Zhang,et al. Distributed Opportunistic Scheduling for Ad Hoc Networks With Random Access: An Optimal Stopping Approach , 2009, IEEE Transactions on Information Theory.