1 |
K. Doppler, M. Rinne, C. Wijting, C. B. Ribeiro, and K. Hugl, "Device-to-Device Communication as an Underlay to LTE-Advanced Networks," IEEE Communications Magazine, vol. 47, no. 12, pp. 42-49, 2009.
DOI
|
2 |
G. Fodor, E. Dahlman, G. Mildh, S. Parkvall, N. Reider, G. Miklos, Z. Turanyi, "Design Aspects of Network Assisted Device-to-Device Communications," IEEE Communication Magazine, vol. 50, no. 3, pp. 170-177, 2012.
DOI
|
3 |
X. Lin, J. G. Andrews, A. Ghosh, and R. Ratasuk, "An Overview of 3GPP Dievice-to-Device Proximity Services," IEEE Communications Magazine, vol. 52, no. 4, pp. 40-48, 2014.
DOI
|
4 |
A. Asadi, Q. Wang, and V. Mancuso, "A Survey on Device-to-Device Communication in Cellular Networks," IEEE Transactions on Communications Surveys and Tutorials, vol. 99, no. pp, pp. 1-19, 2014.
|
5 |
D. Wu, J. Wang, R. Q. Hu, Y. Cai, and L. Zhou, "Energy-Efficient Resource Sharing for Mobile Device-to-Device Multimedia Communications," IEEE Transactions on Vehicular Technology, vol. 63, no. 5, pp. 2093-2103, 2014.
DOI
|
6 |
H. Chen, D. Wu, and Y. Cai, "Coalition Formation Game for Green Resource Management in D2D Communications," IEEE Communications Letters, vol. 18, no. 8, pp. 1395-1398, 2014.
DOI
|
7 |
Z. Zhou, M. Dong, K. Ota, J. Wu, and T. Sato, "Energy Efficiency and Spectral Efficiency Tradeoff in Device-to-Device (D2D) Communications," IEEE Wireless Communications Letters, vol. 3, no. 5, pp. 485-488, 2014.
DOI
|
8 |
J. Yue, C. Ma, H. Yu, and W. Zhou, "Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks," IEEE Communications Letters, vol. 17, no. 11, pp. 2068-2071, 2013.
DOI
|
9 |
H. Zhang, T. Wang, L. Song, and Z. Han, "Radio Resource Allocation for Physical-Layer Security in D2D Underlay Communications," in Proc. of IEEE ICC, pp. 2325-2330. 2014.
|
10 |
X. Guan, Y. Cai, and W. Yang, "On the Reliability-Security Tradeoff and Secrecy Throughput in Cooperative ARQ," IEEE Communications Letters, vol. 18, no. 3, pp. 479-482, 2014.
DOI
|
11 |
X. Guan, Y. Cai, W. Yang, Y. Cheng, and J. Hu, "Increasing Secrecy Capacity via Joint Design of Cooperative Beamforming and Jamming," KSII Transactions on Internet and Information Systems, vol. 6, no. 4, pp. 1041-1062, 2012.
DOI
|
12 |
X. He, and A. Yener, "The Role of an Untrusted Relay in Secret Communication," in Proc. of ISIT, pp. 2212-2216, 2008.
|
13 |
N. Milosavljevic, M. Gastpar, and K. Ramchandran, "Secure Communication using an Untrusted Relay via Sources and Channels," in Proc. of ISIT, pp. 2457-2461, 2009.
|
14 |
R. Zhang, L. Song, Z. Han, and B. Jiao, "Physical Layer Security for Two-Way Untrusted Relaying with Friendly Jammers," IEEE Transactions on Vehicular Technology, vol. 61, no. 8, pp. 3693-3704, 2012.
DOI
|
15 |
J. Lorincz, A. Capone, D. Begusic, "Heuristic Algorithms for Optimization of Energy Consumption in Wireless Access Networks", KSII Transactions on Internet and Information Systems, vol. 5, no. 5, pp. 514-540, 2011.
|
16 |
J. Qu, Y. Cai, D. Wu, and H. Chen, "Stackelberg Game Based Power Allocation for Physical Layer Security of Device- to-Device Communication Underlaying Cellular Networks," Frequenz, vol. 68, no. 5-6, pp. 285-295, 2014.
|