[1]
|
R. Negi and S. Goel, Secure Communications Using Artificial Noise, IEEE Vehicle Technology Conference (VTC), Dallas, TX, September 2005, pp. 1906-1910.
|
[2]
|
S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE Transactions on Wireless Communication, Vol. 7, No. 6, 2008, pp. 2180-2189.
|
[3]
|
M. Ghogho and A. Swami, “Physical Layer Secrecy of MIMO Communications in the Presence of a Poisson Random Field of Eavesdroppers,” IEEE ICC Workshop on Physical Layer Security, Kyoto, Japan, June 2011, pp. 1-5.
|
[4]
|
M. Ghogho and Ananthram, “Physical Layer Security of MIMO frequency selective channels by beamforming and noise generation,” European Signal Processing Conference, Barcelona, Spain, Augest 2011, pp. 829-833.
|
[5]
|
A. Muk-herjee and A. L. Swindlehurst, “Utility of Beamforming Strategies for Secrecy in Multi-user MIMO Wiretap Channels, in Proc. of Forty-Seventh Allerton Conf., Oct 2009: 1268-1276.
|
[6]
|
W. Liao, T. Chang, W. Ma and C. Chi, “Joint transmit beamforming and artificial noise design for QoS discrimination in wireless downlink,” in Proc. IEEE ICASSP, Dallas, Mar 2010, pp. 256-2565.
|
[7]
|
E. Ekrem and S. Ulukus, “The Secrecy Capacity Region of the Gaussian MIMO Multi-Receiver Wiretap Channel,” IEEE Transactions on Information Theory, Vol. 57, No. 4, 2011, pp. 2083-2113. doi:10.1109/TIT.2011.2111750
|
[8]
|
A. Khisti and G. W. Wornell, “Secure Transmission with Multiple Antennas Part II: The MIMOME Wiretap Channel,” IEEE Transactions on Information Theory, Vol. 56, No. 11, 2010, pp. 5515-5532. doi:10.1109/TIT.2010.2068852
|
[9]
|
A. Khisti and G. W. Wornell, “Secure Transmission with Multiple Antennas I: The MISOME Wiretap Channel,” IEEE Transactions on Information Theory, 2010, Vol. 56, No. 11, pp. 3088-3104. doi:10.1109/TIT.2010.2048445
|
[10]
|
X. Zhou and M. R. Mckay, Secure Transmission with Artificial Noise over Fading Channels: Achievable Rate and Optimal Power Allocation, International Conference Signal Processing and Communication Systems, Omaha, NE, Oct. 2010, pp. 3831-3842.
|
[11]
|
A. Mukherjee and A. L. Swindlehurst, “User Election in Multi-user MIMO Systems with Secrecy Considerations,” ASILOMAR Conf. on Signals, Systems, and Computers, Pacific Grove, CA, 2009, pp. 1479-1482.
|