Improving secrecy for multi-relay multi-eavesdropper wireless systems through relay selection
暂无分享,去创建一个
[1] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[2] Yu-Dong Yao,et al. An Adaptive Cooperation Diversity Scheme With Best-Relay Selection in Cognitive Radio Networks , 2010, IEEE Transactions on Signal Processing.
[3] Huiming Wang,et al. Secrecy Transmission With a Helper: To Relay or to Jam , 2015, IEEE Transactions on Information Forensics and Security.
[4] Xiang Zhang,et al. Partner Selection and Incentive Mechanism for Physical Layer Security , 2015, IEEE Transactions on Wireless Communications.
[5] Kiseon Kim,et al. Secrecy Outage Probability of Optimal Relay Selection for Secure AnF Cooperative Networks , 2015, IEEE Communications Letters.
[6] George K. Karagiannidis,et al. Secure Multiuser Communications in Multiple Amplify-and-Forward Relay Networks , 2014, IEEE Transactions on Communications.
[7] Xuelong Li,et al. Secrecy Outage and Diversity Analysis of Cognitive Radio Systems , 2014, IEEE Journal on Selected Areas in Communications.
[8] Hong Long,et al. Robust amplify-and-forward relay beamforming for security with mean square error constraint , 2015, IET Commun..
[9] Hyung Yun Kong,et al. CSI-Secured Orthogonal Jamming Method for Wireless Physical Layer Security , 2014, IEEE Communications Letters.
[10] Hao Chen,et al. Social Tie Based Cooperative Jamming for Physical Layer Security , 2015, IEEE Communications Letters.
[11] Zhi Chen,et al. Cooperative Secrecy Beamforming in Wiretap Interference Channels , 2015, IEEE Signal Processing Letters.
[12] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.
[13] Tran Trung Duy,et al. Relay Selection for Security Enhancement in Cognitive Relay Networks , 2015, IEEE Wireless Communications Letters.
[14] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[15] Javier López,et al. Relay selection for secure 5G green communications , 2015, Telecommun. Syst..
[16] Jing Wang,et al. Cooperative jamming and power allocation with untrusty two-way relay nodes , 2014, IET Commun..
[17] Wenbo Wang,et al. Algorithms for Secrecy Guarantee With Null Space Beamforming in Two-Way Relay Networks , 2014, IEEE Transactions on Signal Processing.
[18] Wei-Ping Zhu,et al. Relay-Selection Improves the Security-Reliability Trade-Off in Cognitive Radio Systems , 2014, IEEE Transactions on Communications.
[19] Feng Liu,et al. Outage Constrained Secrecy Throughput Maximization for DF Relay Networks , 2015, IEEE Transactions on Communications.
[20] Qiang Li,et al. Robust Cooperative Beamforming and Artificial Noise Design for Physical-Layer Secrecy in AF Multi-Antenna Multi-Relay Networks , 2015, IEEE Transactions on Signal Processing.
[21] Il-Min Kim,et al. Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.
[22] Aylin Yener,et al. Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.
[23] Xianbin Wang,et al. Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.
[24] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[25] Stéphane Y. Le Goff,et al. Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer , 2015, IEEE Transactions on Vehicular Technology.
[26] Athanasios V. Vasilakos,et al. Full duplex techniques for 5G networks: self-interference cancellation, protocol design, and relay selection , 2015, IEEE Communications Magazine.
[27] Zhi Chen,et al. On Secrecy Capacity of Gaussian Wiretap Channel Aided by A Cooperative Jammer , 2014, IEEE Signal Processing Letters.