References
- R. V. Meter, K. M. Itoh, and T. D. Ladd. "Architecturedependent execution time of Shor's algorithm." in Proc. Int. Symp. on Mesoscopic Superconductivity and Spintronics. 2006.
- C. Shannon, "Communication theory of secrecy systems," Bell Syst. Technical J., vol. 28, no. 4, pp. 656-715, 1949. https://doi.org/10.1002/j.1538-7305.1949.tb00928.x
- A. D. Wyner "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1255-2387, Oct. 1975.
- S. K. Leung-Yan-Cheong, "On a special class of wiretap channels," IEEE Trans. on Inf. Theory, vol. 23, no. 5, pp. 625-627, Sept. 1977. https://doi.org/10.1109/TIT.1977.1055763
- A. Khisti and G. W. Wornell, "Secure Transmission With Multiple Antennas&-Part II: The MIMOME Wiretap Channel," IEEE Trans. on Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010. https://doi.org/10.1109/TIT.2010.2068852
- S. Goel and R. Negi, "Guaranteeing Secrecy using Artificial Noise," IEEE Trans. on Wireless Commun., vol. 7, no. 6, pp. 2180-2189, June 2008. https://doi.org/10.1109/TWC.2008.060848
- H. Qin, X. Chen, Y. Sun, M. Zhao, and J. Wang, "Optimal Power Allocation for Joint Beamforming and Artificial Noise Design in Secure Wireless Communications," IEEE Int. Conf. on Commun. Workshops (ICC) , June 2011, pp.1-5.
- X. Zhou and M. R. McKay, "Secure transmission with artificial noise over fading channels: achievable rate and optimal power allocation," IEEE Trans. on Vehicular Tech., vol. 59, no. 8, pp. 3831-3842, Oct. 2010. https://doi.org/10.1109/TVT.2010.2059057
- Hu Jin, 김준수, "협력중계 시스템에서의 물리계층 보안 기술," 한국 통신학회지, 제 31권 제2호, 91-97, 2014년 2월
- K. Lee, C. Chae, and J. Kang. "Spectrum leasing via cooperation for enhanced physical-layer secrecy," IEEE Trans. on Vehicular Tech., vol. 62, no. 9, pp. 4672-4678, June 2013. https://doi.org/10.1109/TVT.2013.2269617
- H. Jeon, S. W. McLaughlin, I. Kim, and J. Ha, "Secure communications with untrusted secondary nodes in cognitive radio networks," IEEE Trans. on Wireless Commun. vol. 13, no. 4, pp. 1790-1805, Apr. 2014. https://doi.org/10.1109/TWC.2013.021214.130089
- P. Parada and R. Blahut, "Secrecy capacity of SIMO and slow fading channels," in Proc. IEEE Int. Symp. Inf. Theory, Sep. 2005, pp. 2152-2155.
- M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, June 2008. https://doi.org/10.1109/TIT.2008.921908
- Z. Li, R. Yates, and W. Trappe, "Secrecy capacity of independent parallel channels," in Proc. 44th Annu. Allerton Conf. Communications, Control and Computing, Monticello, Sep. 2006, pp. 841-848.
- Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Secrecy capacity region of fading broadcast channels," in Proc. IEEE Int. Symp. Information Theory, Nice, Jun. 2007, pp. 1291-1295.
- P. K. Gopala, L. Lai, and H. El-Gamal, "On the secrecy capacity of fading channels," in Proc. IEEE Int. Symp. Inf. Theory, Nice, June 2007, pp. 1306-1310.
- Mitola III, Joseph, and Gerald Q. Maguire Jr. "Cognitive radio: making software radios more personal," IEEE Personal Commun., vol. 6. no. 4, pp. 13-18, Aug. 1999. https://doi.org/10.1109/98.788210
- I. F. Akyildiz, W. Lee, M. C. Vuran, and S. Mohanty, "A survey on spectrum management in cognitive radio networks," IEEE Commun. Mag., vol. 46, no. 4, pp. 40-48, Apr. 2008. https://doi.org/10.1109/MCOM.2008.4481339
- Y. Wu, and K. J. Liu. "An information secrecy game in cognitive radio networks," IEEE Trans. Inform. Forensics and Security, vol. 6, no. 3, pp. 831-842, Sep. 2011. https://doi.org/10.1109/TIFS.2011.2144585
- I. Stanojev and A. Yener, "Improving secrecy rate via spectrum leasing for friendly jamming," IEEE Trans. Wireless Commun., vol. 12, no. 1, pp. 134-145, Jan. 2013. https://doi.org/10.1109/TWC.2012.120412.112001
- Y. Liang, A. Somekh-Baruch, H. V. Poor, S. Shamai (Shitz), and S. Verdu, "Capacity of cognitive interference channels with and without secrecy," IEEE Trans. Inf. Theory, vol. 55, no. 2, pp. 604-619, Feb. 2009. https://doi.org/10.1109/TIT.2008.2009584
- M. Bloch and J. Barros, Physical-Layer Security: From Information Theory to Security Engineering. Cambridge University Press, 2011.
- X. Tang, R. Liu, P. Spasojevic, and H. V. Poor, "Interference assisted secret communication," IEEE Trans. Inf. Theory, vol. 57, no. 5, pp. 3153-3167, Sept. 2011. https://doi.org/10.1109/TIT.2011.2121450