1 |
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, “Wireless information-theoretic security,” IEEE Trans. Inf. Theory., vol. 54, no. 6, pp. 2470–2492, June 2008.
DOI
|
2 |
S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, June 2008.
DOI
|
3 |
J. Huang and A. Swindlehurst, “Cooperative jamming for secure communications in MIMO relay networks,” IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871–4884, Oct. 2011.
DOI
|
4 |
Y. Liu, A. P. Petropulu, and H. V. Poor, "Joint decode-and-forward and jamming for wireless physical layer security with destination assiatance," in Proc. Asilomar Conference on Signals, Systems and Computer (ASILOMAR'11), Pacific Grove, USA, Nov. 2011.
|
5 |
J. Huang and A. L. Swindlehurst, “Cooperative jamming for secure communications in MIMO relay networks,” IEEE J. Sel. Areas Commun., vol. 59, no. 10, pp. 4871–4884, Oct. 2011.
|