Secrecy capacity maximization for secure cooperative ad-hoc networks
暂无分享,去创建一个
[1] Bohn Stafleu van Loghum,et al. Online … , 2002, LOG IN.
[2] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[3] Wade Trappe,et al. Network-aware security for group communications , 2007 .
[4] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[5] Jian Wang,et al. Analyzing Amplify-and-Forward and Decode-and-Forward Cooperative Strategies in Wyner's Channel Model , 2009, 2009 IEEE Wireless Communications and Networking Conference.
[6] Xinbing Wang,et al. Impact of secrecy on capacity in large-scale wireless networks , 2012, 2012 Proceedings IEEE INFOCOM.
[7] Hai Su,et al. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.
[8] Miguel R. D. Rodrigues,et al. Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.
[9] Yingbin Liang,et al. Wireless broadcast networks: Reliability, security, and stability , 2008, 2008 Information Theory and Applications Workshop.
[10] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[11] Gregory W. Wornell,et al. Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.
[12] Georgios B. Giannakis,et al. Mutual Information Jammer-Relay Games , 2008, IEEE Trans. Inf. Forensics Secur..
[13] D. West. Introduction to Graph Theory , 1995 .
[14] Hui Liu,et al. OFDM-Based Broadband Wireless Networks – Design and Optimization , 2005 .
[15] Hai Su,et al. Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.
[16] Xi Fang,et al. HERA: An Optimal Relay Assignment Scheme for Cooperative Networks , 2012, IEEE Journal on Selected Areas in Communications.
[17] Hesham El Gamal,et al. The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.
[18] Jie Li,et al. Optimal relay assignment for secrecy capacity maximization in cooperative ad-hoc networks , 2013, 2013 IEEE International Conference on Communications (ICC).
[19] Yiwei Thomas Hou,et al. An Optimal Algorithm for Relay Node Assignment in Cooperative Ad Hoc Networks , 2011, IEEE/ACM Transactions on Networking.
[20] Hyundong Shin,et al. Cooperative Communications with Outage-Optimal Opportunistic Relaying , 2007, IEEE Transactions on Wireless Communications.
[21] Jiannong Cao,et al. Self-Supported Cooperative Networking for Emergency Services in Multi-Hop Wireless Networks , 2012, IEEE Journal on Selected Areas in Communications.
[22] John S. Thompson,et al. Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.
[23] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[24] Zhu Han,et al. Joint Relay and Jammer Selection for Secure Two-Way Relay Networks , 2012, IEEE Trans. Inf. Forensics Secur..
[25] Raviraj S. Adve,et al. Improving amplify-and-forward relay networks: optimal power allocation versus selection , 2006, IEEE Transactions on Wireless Communications.