[1]
|
A. D. Wyner, “The Wire-tap Channel,” The Bell System Technical Journal, Vol. 54, No. 8, 1975, pp. 1355-1387. doi:10.1002/j.1538-7305.1975.tb02040.x
|
[2]
|
I. Csiszar and J. Koner, “Broadcast Channels with Confidential Messages,” IEEE Transactions on Information Theory, Vol. 24, No. 3, 1978, pp. 339-348. doi:10.1109/TIT.1978.1055892
|
[3]
|
Z. Li and X. G. Xia, “A Distributed Differentially Encoded OFDM Scheme for Asynchronous Cooperative Systems with Low Probability of Interception,” IEEE Transactions on Wireless Communication, Vol. 8, No. 7, 2009, pp. 3372-3379. doi:10.1109/TWC.2009.080365
|
[4]
|
F. Renna, N. Laurenti and H. V. Poor, “Physical Layer Secrecy for OFDM Systems,” in Proceedings of the IEEE European Wireless Conference, Lucca, Italy, 2010, pp. 782-789.
|
[5]
|
F. Renna, N. Laurenti and H. V. Poor, “High SNR Secrecy Rates with OFDM Signaling over Fading Channels,” in Proceedings of the IEEE 21st International Symposium on Personal Indoor and Mobile Radio Communications,Istanbul, Turkey, 2010, pp. 2692-2697.
|
[6]
|
E. Jorswieck and A. Wolf, “Resource Allocation for the Wire-tap Multi-carrier Broadcast Channel,” in Proceedings of International Workshop on Multiple Access Communications, Petersburg, Russia, 2008.
|
[7]
|
Z. Li, R. Yates and W. Trappe, “Secrecy Capacity ofIndependent Parallel Channels,” in Proceedings of Allerton Conference on Communications, 2006, pp. 841-848.
|
[8]
|
X. Zhou and M. R. McKay, “Secure Transmission with Artificial Noiseover Fading Channels: AchievableRate and Optimal Power Allocation,” IEEE Transactions on Vehicular Technology, 2010, pp. 3831-3842. doi:10.1109/TVT.2010.2059057
|
[9]
|
M. Bloch, J. Barros, M. R. S. Rodrigues and S. W. McLaughlin, “Wireless Information Theoretic Security,” IEEE Transactions on Information Theory, Vol. 54, No. 6, 2008, pp. 2515-2534. doi:10.1109/TIT.2008.921908
|
[10]
|
D. W. K. Ng and R. Schober, Cross-layer Scheduling for Ofdma Amplify and Forward Relay Networks,” IEEE Transactions on Vehicular Technology, Vol. 59, No. 3, 2010, pp. 1443-1458. doi:10.1109/TVT.2009.2039814
|
[11]
|
W. Yu and R. Liu, “Dual Methods for Non-convex Spectrum Optimization of Multicarrier Systems,” IEEE Transactions on Communications, Vol. 54, No. 7, 2006, pp. 1310- 1322. doi:10.1109/TCOMM.2006.877962
|
[12]
|
S. Boyd and L. Vandenberghe, Convex Optimization, Cambridge University Press, 2004. doi:10.1017/CBO9780511804441
|
[13]
|
D. P. Palomar and M. Chiang, “Chiang Tutorial on Decomposition Methods for Network Utility Maximization,” IEEE Journal on Selected Areas in Communications, Vol. 24, No. 8, 2006, pp. 1439-1451. doi:10.1109/JSAC.2006.879350
|
[14]
|
3GPP TR25.996 V9.0.0, Spatial Channel Model for Multiple Input Multiple Output Simulations [S]. 3GPP, 2009:
|
[15]
|
H. Gao, P. J. Smith and M. V. Clark, “Theoretical Reliability of MMSE Linear Diversity Combining in Rayleigh Fading Additive Interference Channels,” IEEE Transaction Communications, 1998, Vol. 46, pp. 666-672.
|