Optimal Power Control and Link Selection Policy for Buffer-Aided Two-Hop Secure Communications
暂无分享,去创建一个
[1] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[2] Romano Fantacci,et al. Buffer-Aided Diamond Relay Network With Block Fading and Inter-Relay Interference , 2016, IEEE Transactions on Wireless Communications.
[3] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2007, ISIT.
[4] H. Vincent Poor,et al. Buffering in a Three-Node Relay Network , 2008, IEEE Transactions on Wireless Communications.
[5] Naofal Al-Dhahir,et al. Physical-Layer Security of a Buffer-Aided Full-Duplex Relaying System , 2016, IEEE Communications Letters.
[6] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[7] Robert Schober,et al. Buffer-Aided Relaying with Adaptive Link Selection , 2012, IEEE Journal on Selected Areas in Communications.
[8] Hesham El Gamal,et al. The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.
[9] Zhi Chen,et al. Max-Ratio Relay Selection in Secure Buffer-Aided Cooperative Wireless Networks , 2014, IEEE Transactions on Information Forensics and Security.
[10] Huiming Wang,et al. Secrecy Transmission With a Helper: To Relay or to Jam , 2015, IEEE Transactions on Information Forensics and Security.
[11] A. Lee Swindlehurst,et al. Buffer-Aided Relaying for Two-Hop Secure Communication , 2015, IEEE Transactions on Wireless Communications.