References
- M. Costa, "Writing on Dirty Paper," IEEE Trans. Info. Theory, vol. 29, no. 3, May 1983, pp. 439-441. https://doi.org/10.1109/TIT.1983.1056659
- G.J. Foschini and M.J. Gans, "On Limits of Wireless Communications in a Fading Environment When Using Multiple Antennas," Wireless Pers. Commun., vol. 6, no. 3, Mar. 1998, pp. 311-335. https://doi.org/10.1023/A:1008889222784
- T.K.Y. Lo, "Maximum Ratio Transmission," IEEE Int. Conf. Commun., Vancouver, Canada, June 6-10, 1999, pp. 1310-1314.
- C.B. Peel, B.M. Hochwald, and A.L. Swindlehurst, "A Vector-Perturbation Technique for Near-Capacity Multiantenna Multiuser Communication-Part I: Channel Inversion and Regularization," IEEE Trans. Commun., vol. 53, no. 1, Jan. 2005, pp. 195-202. https://doi.org/10.1109/TCOMM.2004.840638
- G. Caire and S. Shamai, "On the Achievable Throughput of a Multi-antenna Gaussian Broadcast Channel," IEEE Trans. Info. Theory, vol. 49, no. 7, July 2003, pp. 1691-1706. https://doi.org/10.1109/TIT.2003.813523
- P. Viswanath and D.N.C. Tse, "Sum Capacity of the Vector Gaussian Broadcast Channel and Uplink-Downlink Duality," IEEE Trans. Info. Theory, vol. 49, no. 8, Aug. 2003, pp. 1912-1921. https://doi.org/10.1109/TIT.2003.814483
- S. Vishwanath, N. Jindal, and A. Goldsmith, "Duality, Achievable Rates, and Sum Capacity of Gaussian MIMO Broadcast Channels," IEEE Trans. Info. Theory, vol. 49, no. 10, Oct. 2003, pp. 2658-2668. https://doi.org/10.1109/TIT.2003.817421
- C. Windpassisnger et al., "Precoding in Multi-antenna and Multiuser Communications," IEEE Trans. Wireless Commun., vol. 3, no. 4, July 2004, pp. 1305-1315. https://doi.org/10.1109/TWC.2004.830852
- Z. Shen et al., "Low Complexity User Selection Algorithms for Multiuser MIMO Systems with Block Diagonalization," IEEE Trans. Signal Process., vol. 54, no. 9, Sept. 2006, pp. 3658-3663. https://doi.org/10.1109/TSP.2006.879269
- R. Chen, R.W. Heath Jr., and J.G. Andrews, "Transmit Selection Diversity for Unitary Precoded Multiuser Spatial Multiplexing Systems with Linear Receivers," IEEE Trans. Signal Process., vol. 55, no. 3, Mar. 2007, pp. 1159-1171. https://doi.org/10.1109/TSP.2006.887147
- A.D. Wyner, "The Wire-Tap Channel," The Bell Sys. Tech. J., vol. 54, no. 8, Oct. 1975, pp. 1355-1387. https://doi.org/10.1002/j.1538-7305.1975.tb02040.x
- M. Bloch et al., "Wireless Information-Theoretic Security," IEEE Trans. Info. Thory, vol. 54, no. 6, June 2008, pp. 2515-2534. https://doi.org/10.1109/TIT.2008.921908
- A. Khisti, A. Tchamkerten, and G.W. Wornell, "Secure Broadcasting over Fading Channels," IEEE Trans. Info. Theory, vol. 54, no. 6, June 2008, pp. 2453-2469. https://doi.org/10.1109/TIT.2008.921861
- E.G. Larsson and E.A. Jorswieck, "Competition versus Cooperation on the MISO Interference Channel," IEEE J. Sel. Areas Commun., vol. 26, no. 7, Sept. 2008, pp. 1059-1069. https://doi.org/10.1109/JSAC.2008.080904
- A. Khisti and G.W. Wornell, "Secure Transmission with Multiple Antennas I: The MISOME Wiretap Channel," IEEE Trans. Info. Theory, vol. 56, no. 7, July 2010, pp. 3088-3104. https://doi.org/10.1109/TIT.2010.2048445
- R. Liu and H.V. Poor, "Secrecy Capacity Region of a Multiple-Antenna Gaussian Broadcast Channel with Confidential Messages," IEEE Trans. Info. Theory, vol. 55, no. 3, Mar. 2009, pp. 1235-1249. https://doi.org/10.1109/TIT.2008.2011448
- T. Liu and S. Shamai, "A Note on the Secrecy Capacity of the Multiple Antenna Wiretap Channel," IEEE Trans. Info. Theory, vol. 55, no. 6, June 2009, pp. 2547-2553. https://doi.org/10.1109/TIT.2009.2018322
- F. Oggier and B. Hassibi, "The Secrecy Capacity of the MIMO Wiretap Channel," IEEE Trans. Info. Theory, vol. 57, no. 8, Aug. 2011, pp. 4961-4972. https://doi.org/10.1109/TIT.2011.2158487
- J. Zhang et al., "Ergodic Secrecy Sum-Rate for Multiuser Downlink Transmission via Regularized Channel Inversion: Large System Analysis," IEEE Commun. Lett., July 2014, pp. 1627-1630.
- N. Yang et al., "Physical Layer Security of TAS/MRC with Antenna Correlation," IEEE Trans. Info. Forensics Security, Jan. 2013, pp. 254-259.
- X. Chen, C. Yuen, and Z. Zhang, "Exploiting Large-Scale MIMO Techniques for Physical Layer Security with Imperfect Channel State Information," IEEE GLOBECOM, Austin, TX, USA, Dec. 8-12, 2014, pp. 1648-1653.
- X. Chen et al., "On the Secrecy Outage Capacity of Physical Layer Security in Large-Scale MIMO Relaying Systems with Imperfect CSI," IEEE Int. Conf., Sydney, Australia, June 10-14, 2014, pp. 2052-2057.
- S. Goel and R. Negi, "Guaranteeing Secrecy Using Artificial Noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, June 2008, pp. 2180-2189. https://doi.org/10.1109/TWC.2008.060848
- N. Sklavos and X. Zhang, Wireless Security and Cryptography: Specifications and Implementations, Boca Raton, FL, USA: CRC Press, 2007.
Cited by
- Joint distributed beamforming and jamming schemes in decode-and-forward relay networks for physical layer secrecy vol.2017, pp.1, 2015, https://doi.org/10.1186/s13638-017-0997-x
- Threshold Secret Sharing Transmission against Passive Eavesdropping in MIMO Wireless Networks vol.2018, pp.None, 2015, https://doi.org/10.1155/2018/4143061