1 |
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless Information-Theoretic Security," IEEE Trans. on Information Theory, vol. 54, no. 6, pp. 2515-2534, Jun. 2008.
DOI
|
2 |
I. Krikidis, "Opportunistic relay selection for cooperative networks with secrecy constraints," IET Communications, vol. 4, no. 15, pp. 1789-1791, Oct. 2010.
|
3 |
B. V. Nguyen, K. Kim, "Secrecy outage probability of optimal relay selection for secure AnF cooperative networks," IEEE Communications Letter, vol. 19, no. 12, pp. 2086-2089, Oct. 2015.
DOI
|
4 |
W. Liu, D. Tan, G. Xu, "Low complexity power allocation and joint relay-jammer selection in cooperative jamming DF relay wireless secure networks," 2013 International Conference on Anti-Counterfeiting, Security and Identification (ASID), pp. 1-5, Oct. 2013.
|
5 |
J. Xiong, D. Ma, C. Liu, X. Wang, "Secure communications for two-way relay networks via relay chatting," Communications and Network, vol. 5, no. 3C, pp. 42-47, Sep. 2013.
DOI
|
6 |
J. Zhu, Y. Zou, B. Champagne, W. Zhu, and L. Hanzo, "Security-reliability tradeoff analysis of multirelay-aided decode-and-forward cooperation systems," IEEE Trans. on Vehicular Technology, vol. 65, no. 7, pp. 5825-5831, July. 2015.
DOI
|
7 |
I. Krikidis, J. S. Thompson, S. Mclaughlin, "Relay selection for secure cooperative networks with jamming," IEEE Trans. on Wireless Communications, vol. 8, no. 10, pp. 5003-5011, Oct. 2009.
DOI
|
8 |
J. Chen, R. Zhang, L. Song, Z. Han, and B. Jiao, "Joint relay and jammer selection for secure two-way relay networks," IEEE Trans. on Information Forensics and Security, vol. 7, no. 1, pp. 310-320, Feb. 2012.
DOI
|