暂无分享,去创建一个
Richard Demo Souza | Bartolomeu F. Uchôa Filho | João Luiz Rebelatto | Rodrigo Tsuneyoshi Kaido | Ohara Kerusauskas Rayel
[1] Branka Vucetic,et al. Multiuser Cooperative Diversity Through Network Coding Based on Classical Coding Theory , 2010, IEEE Transactions on Signal Processing.
[2] H. Vincent Poor,et al. On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels , 2007, IEEE Transactions on Information Theory.
[3] Frederic Gabry. Cooperation for Secrecy in Wireless Networks , 2012 .
[4] Hesham El Gamal,et al. The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.
[5] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[6] Mehdi Bennis,et al. Performance of Transmit Antenna Selection Physical Layer Security Schemes , 2012, IEEE Signal Processing Letters.
[7] Iain B. Collings,et al. Transmit Antenna Selection for Security Enhancement in MIMO Wiretap Channels , 2013, IEEE Transactions on Communications.
[8] Ming Xiao,et al. Multiple-User Cooperative Communications Based on Linear Network Coding , 2010, IEEE Transactions on Communications.
[9] Ruoheng Liu,et al. On the Achievable Secrecy Throughput of Block Fading Channels with No Channel State Information at Transmitter , 2007, 2007 41st Annual Conference on Information Sciences and Systems.
[10] Miguel R. D. Rodrigues,et al. Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.
[11] Matthieu R. Bloch,et al. Physical Layer Security , 2020, Encyclopedia of Wireless Networks.
[12] Joseph Lipka,et al. A Table of Integrals , 2010 .
[13] Abbas Jamalipour,et al. Wireless communications , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[14] L. Devroye. Non-Uniform Random Variate Generation , 1986 .
[15] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.
[16] Gregory W. Wornell,et al. Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.
[17] Richard Demo Souza,et al. Network-coded cooperation for a two-user wiretap channel , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[18] Rudolf Ahlswede,et al. Network information flow , 2000, IEEE Trans. Inf. Theory.
[19] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[20] Kerstin Vogler,et al. Table Of Integrals Series And Products , 2016 .
[21] Bruce W. Schmeiser,et al. Random variate generation , 1981, WSC '81.
[22] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[23] E. Meulen,et al. Three-terminal communication channels , 1971, Advances in Applied Probability.
[24] A. Field. Communications , 1963, The Journal of Asian Studies.