Achievable Secrecy Rates of an Energy Harvesting Device with a Finite Battery
暂无分享,去创建一个
[1] Kaibin Huang,et al. Energy Harvesting Wireless Communications: A Review of Recent Advances , 2015, IEEE Journal on Selected Areas in Communications.
[2] Derrick Wing Kwan Ng,et al. Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer , 2013, IEEE Transactions on Wireless Communications.
[3] Gil Zussman,et al. Networking Low-Power Energy Harvesting Devices: Measurements and Algorithms , 2011, IEEE Transactions on Mobile Computing.
[4] Sennur Ulukus,et al. Information-theoretic analysis of an energy harvesting communication system , 2010, 2010 IEEE 21st International Symposium on Personal, Indoor and Mobile Radio Communications Workshops.
[5] Michele Zorzi,et al. Transmission policies for an energy harvesting device with a data queue , 2015, 2015 International Conference on Computing, Networking and Communications (ICNC).
[6] Mohit Sharma,et al. Wireless sensor networks: Routing protocols and security issues , 2014, Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT).
[7] Sennur Ulukus,et al. Gaussian wiretap channel with a batteryless energy harvesting transmitter , 2012, 2012 IEEE Information Theory Workshop.
[8] Meng Zhang,et al. Energy harvesting for secure OFDMA systems , 2014, 2014 Sixth International Conference on Wireless Communications and Signal Processing (WCSP).
[9] Dimitri P. Bertsekas,et al. Dynamic Programming and Optimal Control, Two Volume Set , 1995 .
[10] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[11] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[12] Rosli Salleh,et al. Overview of Security Issues in Wireless Sensor Networks , 2011, 2011 Third International Conference on Computational Intelligence, Modelling & Simulation.
[13] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[14] Sennur Ulukus,et al. Gaussian wiretap channel with an amplitude constraint , 2012, 2012 IEEE Information Theory Workshop.
[15] Vinod Sharma,et al. Optimal energy management policies for energy harvesting sensor nodes , 2008, IEEE Transactions on Wireless Communications.
[16] Guanding Yu,et al. On the Secrecy Capacity of Fading Wireless Channel with Multiple Eavesdroppers , 2007, 2007 IEEE International Symposium on Information Theory.
[17] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.
[18] Derrick Wing Kwan Ng,et al. Resource allocation for secure communication in systems with wireless information and power transfer , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).
[19] Michele Zorzi,et al. Achievable Secrecy Rates of an Energy Harvesting Device , 2016, IEEE Journal on Selected Areas in Communications.