Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("physical layer security")

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 107

  • Page / 5
Export

Selection :

  • and

On the (in)security of two Joint Encryption and Error Correction schemesQI CHAI; GUANG GONG.International journal of security and networks (Print). 2011, Vol 6, Num 4, pp 191-200, issn 1747-8405, 10 p.Article

Security Versus Reliability Analysis of Opportunistic RelayingYULONG ZOU; XIANBIN WANG; WEIMING SHEN et al.IEEE transactions on vehicular technology. 2014, Vol 63, Num 6, pp 2653-2661, issn 0018-9545, 9 p.Article

Multiple-Input Multiple-Output Gaussian Broadcast Channels With Common and Confidential MessagesLY, Hung D; TIE LIU; YINGBIN LIANG et al.IEEE transactions on information theory. 2010, Vol 56, Num 11, pp 5477-5487, issn 0018-9448, 11 p.Article

Anti-Jamming Message-Driven Frequency Hopping―Part II: Capacity Analysis Under Disguised JammingLEI ZHANG; TONGTONG LI.IEEE transactions on wireless communications. 2013, Vol 12, Num 1, pp 80-88, issn 1536-1276, 9 p.Article

On Energy-Secrecy Trade-Offs for Gaussian Wiretap ChannelsCOMANICIU, Cristina; POOR, H. Vincent.IEEE transactions on information forensics and security. 2013, Vol 8, Num 1-2, pp 314-323, issn 1556-6013, 10 p.Article

A Closed-Form Power Allocation for Minimizing Secrecy Outage Probability for MISO Wiretap Channels via Masked BeamformingJUN XIONG; WONG, Kai-Kit; DONGTANG MA et al.IEEE communications letters. 2012, Vol 16, Num 9, pp 1496-1499, issn 1089-7798, 4 p.Article

Solutions for the MIMO Gaussian Wiretap Channel With a Cooperative JammerFAKOORIAN, S. Ali A; LEE SWINDLEHURST, A.IEEE transactions on signal processing. 2011, Vol 59, Num 10, pp 5013-5022, issn 1053-587X, 10 p.Article

Decode-and-Forward Relay Beamforming for Secrecy with Finite-Alphabet InputVISHWAKARMA, Sanjay; CHOCKALINGAM, A.IEEE communications letters. 2013, Vol 17, Num 5, pp 912-915, issn 1089-7798, 4 p.Article

Jamming Games in the MIMO Wiretap Channel With an Active EavesdropperMUKHERJEE, Amitav; LEE SWINDLEHURST, A.IEEE transactions on signal processing. 2013, Vol 61, Num 1-4, pp 82-91, issn 1053-587X, 10 p.Article

Semi-Blind Key-Agreement over MIMO Fading ChannelsRENNA, Francesco; BLOCH, Matthieu R; LAURENTI, Nicola et al.IEEE transactions on communications. 2013, Vol 61, Num 2, pp 620-627, issn 0090-6778, 8 p.Article

Percolation and Connectivity in the Intrinsically Secure Communications GraphPINTO, Pedro C; WIN, Moe Z.IEEE transactions on information theory. 2012, Vol 58, Num 3, pp 1716-1730, issn 0018-9448, 15 p.Article

Secure Communication via Sending Artificial Noise by the Receiver: Outage Secrecy Capacity/Region AnalysisWEI LI; GHOGHO, Mounir; BIN CHEN et al.IEEE communications letters. 2012, Vol 16, Num 10, pp 1628-1631, issn 1089-7798, 4 p.Article

Secure Wireless Network Connectivity with Multi-Antenna TransmissionXIANGYUN ZHOU; KRISHNA GANTI, Radha; ANDREWS, Jeffrey G et al.IEEE transactions on wireless communications. 2011, Vol 10, Num 2, pp 425-430, issn 1536-1276, 6 p.Article

Exploiting Fountain Codes for Secure Wireless DeliveryHAO NIU; IWAI, Masayuki; SEZAKI, Kaoru et al.IEEE communications letters. 2014, Vol 18, Num 5, pp 777-780, issn 1089-7798, 4 p.Article

Robustness of Physical Layer Security Primitives Against Attacks on Pseudorandom GeneratorsVAIDYANATHASWAMI, Rajaraman; THANGARAJ, Andrew.IEEE transactions on communications. 2014, Vol 62, Num 3, pp 1070-1079, issn 0090-6778, 10 p.Article

Secure Beamforming Design for Physical Layer Network Coding Based MIMO Two-Way RelayingJAYASINGHE, Keeth; JAYASINGHE, Praneeth; RAJATHEVA, Nandana et al.IEEE communications letters. 2014, Vol 18, Num 7, pp 1270-1273, issn 1089-7798, 4 p.Article

Secrecy Degrees of Freedom of MIMO Broadcast Channels With Delayed CSITSHENG YANG; KOBAYASHI, Mari; PIANTANIDA, Pablo et al.IEEE transactions on information theory. 2013, Vol 59, Num 9, pp 5244-5256, issn 0018-9448, 13 p.Article

Spectrum Leasing via Cooperation for Enhanced Physical-Layer SecrecyKEONKOOK LEE; CHAE, Chan-Byoung; JOONHYUK KANG et al.IEEE transactions on vehicular technology. 2013, Vol 62, Num 9, pp 4672-4678, issn 0018-9545, 7 p.Article

Theoretical Analysis and Experimental Investigation on the Confidentiality of 2-D Incoherent Optical CDMA SystemZHENXING WANG; CHANG, John; PRUCNAL, Paul R et al.Journal of lightwave technology. 2010, Vol 28, Num 9-12, pp 1761-1769, issn 0733-8724, 9 p.Article

Algorithms for Secrecy Guarantee With Null Space Beamforming in Two-Way Relay NetworksYUNCHUAN YANG; CONG SUN; HUI ZHAO et al.IEEE transactions on signal processing. 2014, Vol 62, Num 5-8, pp 2111-2126, issn 1053-587X, 16 p.Article

Theory and Performance Analyses in Secure CO-OFDM Transmission System Based on Two-Dimensional PermutationLIJIA ZHANG; BO LIU; XIANGJUN XIN et al.Journal of lightwave technology. 2013, Vol 31, Num 1-4, pp 74-80, issn 0733-8724, 7 p.Article

Multi-Antenna Secure Communications via Selective DiversityLING TANG; HAO CHEN; JIANHUI WU et al.IEICE transactions on communications. 2012, Vol 95, Num 2, pp 587-590, issn 0916-8516, 4 p.Article

Distributed Detection With Censoring Sensors Under Physical Layer SecrecyMARANO, Stefano; MATTA, Vincenzo; WILLETT, Peter K et al.IEEE transactions on signal processing. 2009, Vol 57, Num 5, pp 1976-1986, issn 1053-587X, 11 p.Article

Multiuser Diversity for Secrecy Communications Using Opportunistic Jammer Selection: Secure DoF and Jammer Scaling LawJUNG HOON LEE; WAN CHOI.IEEE transactions on signal processing. 2014, Vol 62, Num 1-4, pp 828-839, issn 1053-587X, 12 p.Article

Strong Secrecy in Bidirectional Broadcast Channels With Confidential MessagesWYREMBELSKI, Rafael F; WIESE, Moritz; BOCHE, Holger et al.IEEE transactions on information forensics and security. 2013, Vol 8, Num 1-2, pp 324-334, issn 1556-6013, 11 p.Article

  • Page / 5