On Secrecy Metrics for Physical Layer Security Over Quasi-Static Fading Channels
暂无分享,去创建一个
[1] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[2] Ioannis Chatzigeorgiou,et al. Rethinking the Intercept Probability of Random Linear Network Coding , 2015, IEEE Communications Letters.
[3] Xiangyun Zhou,et al. New physical layer security measures for wireless transmissions over fading channels , 2014, 2014 IEEE Global Communications Conference.
[4] A. Lee Swindlehurst,et al. Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.
[5] Zhu Han,et al. Joint Relay and Jammer Selection for Secure Decode-and-Forward Two-Way Relay Communications , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[6] Nicola Laurenti,et al. Secrecy Transmission on Parallel Channels: Theoretical Limits and Performance of Practical Codes , 2014, IEEE Transactions on Information Forensics and Security.
[7] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[8] Lingyang Song,et al. Physical Layer Security in Wireless Communications , 2013 .
[9] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[10] Tony Q. S. Quek,et al. Secure communication via jamming in massive MIMO Rician channels , 2014, 2014 IEEE Globecom Workshops (GC Wkshps).
[11] J. Kiefer,et al. Sequential minimax search for a maximum , 1953 .
[12] Thomas M. Cover,et al. Elements of information theory (2. ed.) , 2006 .
[13] Marco Baldi,et al. Coding With Scrambling, Concatenation, and HARQ for the AWGN Wire-Tap Channel: A Security Gap Analysis , 2012, IEEE Transactions on Information Forensics and Security.
[14] John M. Shea,et al. LDPC code design for the BPSK-constrained Gaussian wiretap channel , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).
[15] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.
[16] Camilla Hollanti,et al. Probability estimates for fading and wiretap channels from ideal class zeta functions , 2014, Adv. Math. Commun..
[17] Neri Merhav,et al. Relations between entropy and error probability , 1994, IEEE Trans. Inf. Theory.
[18] Frédérique E. Oggier,et al. Secrecy gain: A wiretap lattice code design , 2010, 2010 International Symposium On Information Theory & Its Applications.
[19] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[20] Shlomo Shamai,et al. Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.
[21] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[22] Matthew R. McKay,et al. Rethinking the Secrecy Outage Formulation: A Secure Transmission Design Perspective , 2011, IEEE Communications Letters.
[23] Gregory W. Wornell,et al. Secure Broadcasting Over Fading Channels , 2008, IEEE Transactions on Information Theory.
[24] Frédérique E. Oggier,et al. An Error Probability Approach to MIMO Wiretap Channels , 2011, IEEE Transactions on Communications.
[25] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[26] Iain B. Collings,et al. Transmit Antenna Selection for Security Enhancement in MIMO Wiretap Channels , 2013, IEEE Transactions on Communications.
[27] Xiangyun Zhou,et al. Secure On-Off Transmission Design With Channel Estimation Errors , 2013, IEEE Transactions on Information Forensics and Security.
[28] Byung-Jae Kwak,et al. LDPC Codes for the Gaussian Wiretap Channel , 2009, IEEE Transactions on Information Forensics and Security.
[29] Reza Soosahabi,et al. Scalable PHY-Layer Security for Distributed Detection in Wireless Sensor Networks , 2012, IEEE Transactions on Information Forensics and Security.
[30] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[31] Marco Baldi,et al. Performance assessment and design of finite length LDPC codes for the Gaussian wiretap channel , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).
[32] N. Merhav,et al. Relations Between Entropy and Error Probability , 1993, Proceedings. IEEE International Symposium on Information Theory.
[33] Gonzalo Seco-Granados,et al. Amplify-and-Forward Compressed Sensing as a Physical-Layer Secrecy Solution in Wireless Sensor Networks , 2014, IEEE Transactions on Information Forensics and Security.
[34] John M. Shea,et al. Secret-Sharing LDPC Codes for the BPSK-Constrained Gaussian Wiretap Channel , 2011, IEEE Transactions on Information Forensics and Security.
[35] Xiangyun Zhou,et al. Wireless Physical Layer Security with Imperfect Channel State Information: A Survey , 2013, ArXiv.