Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("cooperative jamming")

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 16 of 16

  • Page / 1
Export

Selection :

  • and

Opportunistic Relaying for Secrecy Communications: Cooperative Jamming vs. Relay ChattingZHIGUO DING; LEUNG, Kin K; GOECKEL, Dennis L et al.IEEE transactions on wireless communications. 2011, Vol 10, Num 6, pp 1725-1729, issn 1536-1276, 5 p.Article

Secure Degrees of Freedom of One-Hop Wireless NetworksJIANWEI XIE; ULUKUS, Sennur.IEEE transactions on information theory. 2014, Vol 60, Num 6, pp 3359-3378, issn 0018-9448, 20 p.Conference Paper

An Effective Secure Transmission Scheme for AF Relay Networks with Two-Hop Information LeakageMEILU LIN; JIANHUA GE; YE YANG et al.IEEE communications letters. 2013, Vol 17, Num 8, pp 1676-1679, issn 1089-7798, 4 p.Article

Robust Secure Transmission in MISO Channels Based on Worst-Case OptimizationJING HUANG; LEE SWINDLEHURST, A.IEEE transactions on signal processing. 2012, Vol 60, Num 4, pp 1696-1707, issn 1053-587X, 12 p.Article

Improving Wireless Security for Bidirectional Communication ScenariosZHIGUO DING; MAI XU; JIANHUA LU et al.IEEE transactions on vehicular technology. 2012, Vol 61, Num 6, pp 2842-2848, issn 0018-9545, 7 p.Article

Solutions for the MIMO Gaussian Wiretap Channel With a Cooperative JammerFAKOORIAN, S. Ali A; LEE SWINDLEHURST, A.IEEE transactions on signal processing. 2011, Vol 59, Num 10, pp 5013-5022, issn 1053-587X, 10 p.Article

Providing Secrecy With Structured Codes: Two-User Gaussian ChannelsXIANG HE; YENER, Aylin.IEEE transactions on information theory. 2014, Vol 60, Num 4, pp 2121-2138, issn 0018-9448, 18 p.Conference Paper

Improving Secrecy Rate via Spectrum Leasing for Friendly JammingSTANOJEV, Igor; YENER, Aylin.IEEE transactions on wireless communications. 2013, Vol 12, Num 1, pp 134-145, issn 1536-1276, 12 p.Article

Wireless Secure Communications via Cooperative Relaying and JammingLING TANG; HAO CHEN; JIANHUI WU et al.IEICE transactions on communications. 2012, Vol 95, Num 9, pp 2774-2784, issn 0916-8516, 11 p.Article

Uncoordinated Cooperative Jamming for Secret CommunicationsSHUANGYU LUO; JIANGYUAN LI; PETROPULU, Athina P et al.IEEE transactions on information forensics and security. 2013, Vol 8, Num 7-8, pp 1081-1090, issn 1556-6013, 10 p.Article

Deaf Cooperation and Relay Selection Strategies for Secure Communication in Multiple Relay NetworksBASSILY, Raef; ULUKUS, Sennur.IEEE transactions on signal processing. 2013, Vol 61, Num 5-8, pp 1544-1554, issn 1053-587X, 11 p.Article

Secure Communication Via an Untrusted Non-Regenerative Relay in Fading ChannelsJING HUANG; MUKHERJEE, Amitav; LEE SWINDLEHURST, A et al.IEEE transactions on signal processing. 2013, Vol 61, Num 9-12, pp 2536-2550, issn 1053-587X, 15 p.Article

Optimal Cooperative Jamming for Multiuser Broadcast Channel with Multiple EavesdroppersJUN YANG; KIM, Il-Min; DONG IN KIM et al.IEEE transactions on wireless communications. 2013, Vol 12, Num 6, pp 2840-2852, issn 1536-1276, 13 p.Article

The Role of Feedback in Two-Way Secure CommunicationsXIANG HE; YENER, Aylin.IEEE transactions on information theory. 2013, Vol 59, Num 12, pp 8115-8130, issn 0018-9448, 16 p.Article

Adaptive Limited Feedback for MISO Wiretap Channels With Cooperative JammingMINYAN PEI; SWINDLEHURST, A. Lee; DONGTANG MA et al.IEEE transactions on signal processing. 2014, Vol 62, Num 1-4, pp 993-1004, issn 1053-587X, 12 p.Article

Reliable and Secure Cooperative Communication for Wireless Sensor Networks Making Use of Cooperative Jamming with Physical Layer SecurityROHOKALE, Vandana Milind; PRASAD, Neeli Rashmi; PRASAD, Ramjee et al.Wireless personal communications. 2013, Vol 73, Num 3, pp 595-610, issn 0929-6212, 16 p.Article

  • Page / 1