Near-Optimal Modulo-and-Forward Scheme for the Untrusted Relay Channel
暂无分享,去创建一个
[1] Soung Chang Liew,et al. Channel coding and decoding in a relay system operated with physical-layer network coding , 2008, IEEE Journal on Selected Areas in Communications.
[2] Soung Chang Liew,et al. > Replace This Line with Your Paper Identification Number (double-click Here to Edit) < 1 , 2022 .
[3] Gonzalo Seco-Granados,et al. Opportunistic relay selection with outdated CSI: outage probability and diversity analysis , 2009, IEEE Transactions on Wireless Communications.
[4] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[5] Robert W. Heath,et al. Relay Subset Selection in Wireless Networks Using Partial Decode-and-Forward Transmission , 2007, VTC Spring 2008 - IEEE Vehicular Technology Conference.
[6] Miguel R. D. Rodrigues,et al. Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.
[7] Sriram Vishwanath,et al. Generalized Degrees of Freedom of the Symmetric Gaussian $K$ User Interference Channel , 2010, IEEE Transactions on Information Theory.
[8] Suhas N. Diggavi,et al. Approximately Achieving Gaussian Relay Network Capacity With Lattice-Based QMF Codes , 2013, IEEE Transactions on Information Theory.
[9] Aylin Yener,et al. Providing secrecy with lattice codes , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[10] H. Vincent Poor,et al. On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels , 2007, IEEE Transactions on Information Theory.
[11] Zhu Han,et al. Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers , 2012, IEEE Transactions on Vehicular Technology.
[12] Simon Litsyn,et al. Lattices which are good for (almost) everything , 2005, IEEE Transactions on Information Theory.
[13] Caijun Zhong,et al. Dual-hop systems with noisy relay and interference-limited destination , 2010, IEEE Transactions on Communications.
[14] Li Sun,et al. Performance Study of Two-Hop Amplify-and-Forward Systems With Untrustworthy Relay Nodes , 2012, IEEE Transactions on Vehicular Technology.
[15] Mikael Skoglund,et al. Nested Polar Codes for Wiretap and Relay Channels , 2010, IEEE Communications Letters.
[16] Tao Zhang,et al. On the Security Performance of Physical-Layer Network Coding , 2009, 2009 IEEE International Conference on Communications.
[17] Il-Min Kim,et al. Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.
[18] A. Lee Swindlehurst,et al. Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels , 2013, IEEE Transactions on Signal Processing.
[19] Aylin Yener,et al. End-to-End Secure Multi-Hop Communication with Untrusted Relays , 2008, IEEE Transactions on Wireless Communications.
[20] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.
[21] Cong Ling,et al. Achievable Rates for Lattice Coded Gaussian Wiretap Channels , 2011, 2011 IEEE International Conference on Communications Workshops (ICC).
[22] Axthonv G. Oettinger,et al. IEEE Transactions on Information Theory , 1998 .
[23] Alexander Vardy,et al. Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes , 2010, IEEE Transactions on Information Theory.
[24] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[25] Richard E. Blahut,et al. Secrecy capacity of SIMO and slow fading channels , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..
[26] A. Lee Swindlehurst,et al. Securing multi-antenna two-way relay channels with analog network coding against eavesdroppers , 2010, 2010 IEEE 11th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
[27] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[28] VishwanathSriram,et al. Generalized degrees of freedom of the symmetric Gaussian K user interference channel , 2010 .
[29] Hongbo Zhu,et al. Large System Secrecy Rate Analysis for SWIPT MIMO Wiretap Channels , 2016, IEEE Transactions on Information Forensics and Security.
[30] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[31] Byung-Jae Kwak,et al. LDPC Codes for the Gaussian Wiretap Channel , 2009, IEEE Transactions on Information Forensics and Security.
[32] Uri Erez,et al. Achieving 1/2 log (1+SNR) on the AWGN channel with lattice encoding and decoding , 2004, IEEE Transactions on Information Theory.
[33] A. Robert Calderbank,et al. Applications of LDPC Codes to the Wiretap Channel , 2004, IEEE Transactions on Information Theory.
[34] Aylin Yener,et al. Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.