Statistical security model and power adaptation over wireless fading channels
暂无分享,去创建一个
Li Sun | Yichen Wang | Pinyi Ren | Qinghe Du | Li Sun | Pinyi Ren | Yichen Wang | Qinghe Du
[1] H. Vincent Poor,et al. The Wiretap Channel With Feedback: Encryption Over the Channel , 2007, IEEE Transactions on Information Theory.
[2] Matthew R. McKay,et al. Rethinking the Secrecy Outage Formulation: A Secure Transmission Design Perspective , 2011, IEEE Communications Letters.
[3] Cheng-Shang Chang,et al. Performance guarantees in communication networks , 2000, Eur. Trans. Telecommun..
[4] Hai Su,et al. Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.
[5] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[6] Matthieu R. Bloch,et al. Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security , 2013, IEEE Signal Processing Magazine.
[7] Li Sun,et al. Exploiting Fountain Codes for Secure Wireless Delivery , 2014, IEEE Communications Letters.
[8] Matthieu R. Bloch,et al. Physical Layer Security , 2020, Encyclopedia of Wireless Networks.
[9] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.
[10] Andrea J. Goldsmith,et al. Variable-rate variable-power MQAM for fading channels , 1997, IEEE Trans. Commun..
[11] Hsiao-Chun Wu,et al. Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.
[12] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[13] Katta G. Murty,et al. Nonlinear Programming Theory and Algorithms , 2007, Technometrics.