[1]
|
A. D. Wyner, “The Wiretap Channel,” Bell System Technical Journal, Vol. 54, No. 8, 1975, pp. 1355-1367. doi:10.1002/j.1538-7305.1975.tb02040.x
|
[2]
|
S. K. Leung-Yan-Cheong and M. E. Hellman, “The Gaussian Wiretap Channel,” IEEE Transactions on Information Theory, Vol. 24, No. 4, 1978, pp. 451-456. doi:10.1109/TIT.1978.1055917
|
[3]
|
I. Csiszár and J.Körner, “Broadcast Channels With Confidential Messages,” IEEE Transactions on Information Theory, Vol. 24, No. 3, 1978, pp. 339-348. doi:10.1109/TIT.1978.1055892
|
[4]
|
F. Oggier and B. Hassibi, “The Secrecy Capacity of The MIMO Wiretap Channel,” IEEE Transactions on Information Theory, Vol. 57, No. 8, 2011, pp. 4961-4972. doi:10.1109/TIT.2011.2158487
|
[5]
|
T. Liu and S. Shamai, “A Note on The Secrecy Capacity of The Multiple Antenna Wiretap Channel,” IEEE Transactions on Information Theory, Vol. 55, No. 6, 2009, pp. 2547-2553. doi:10.1109/TIT.2009.2018322
|
[6]
|
L. Dong, Z. Han, A. P. Petropulu and H. V. Poor, “Improving Wireless Physical Layer Security via Cooperating Relays,” IEEE Transactions on Signal Processing, Vol. 58, No. 3, 2010, pp. 1875-1888. doi:10.1109/TSP.2009.2038412
|
[7]
|
H. M. Wang, Q. Y. Yin and X. G. Xia, “Improving the Physical Layer Security of Wireless Two-Way Relaying via Analog Network Coding,” Proceedings of IEEE Global Telecommunications Conference (GLOBECOM), Texas, Houston, Dec. 2011.
|
[8]
|
H. M. Wang, Q. Y. Yin and X. G. Xia, “Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks,” IEEE Transactions on Signal Processing, Vol. 60, No. 7, 2012, pp. 3532-3545. doi:10.1109/TSP.2012.2191543
|
[9]
|
I. Krikidis, J. S. Thompson and S. McLaughlin, “Relay Selection for Secure Cooperative Networks With Jamming,” IEEE Transactions on Wireless Communications, Vol. 8, No. 10, 2009, pp. 5003-5011. doi:10.1109/TWC.2009.090323
|
[10]
|
J. Chen, R. Zhang, L. Song, Z. Han and B. Jiao, “Joint Relay and Jammer Selection for Secure Two-Way Relay Networks,” IEEE Transactions on Information Forensics and Security, Vol. 7, No. 1, Jan. 2012, pp. 310-320. doi:10.1109/TIFS.2011.2166386
|
[11]
|
Z. Ding, K. K. Leung, D. L. Goeckel and D. Towsley. “Opportunistic Relaying for Secrecy Communications: Cooperative Jamming vs. Relay Chatting,” IEEE Transactions on Wireless Communications, Vol. 10, No. 6, 2011, pp. 1725-1729. doi: /10.1109/TWC.2011.040511.101694
|
[12]
|
A. Bletsas, A. Khisti, D. P. Reed and A. Lippman, “A Simple Cooperative Diversity Method Based On Network Path Selection,” IEEE Journal Selected in Areas Communications, Vol. 24, No. 3, Mar. 2006, pp. 659-672. doi:10.1109/JSAC.2005.862417
|
[13]
|
M. Bloch, J. Barros, M. Rodrigues, and S. McLaughlin, “Wireless Information-theoretic Security,” IEEE Transactions on Information Theory, Vol. 54, No. 6, 2008, pp. 2515-2534. doi:10.1109/TIT.2008.921908
|
[14]
|
J. Xiong, K. K. Wong, D. Ma and J. Wei, “A Closed-Form Power Allocation for Minimizing Secrecy Outage Probability for MISO Wiretap Channels via Masked Beamforming,” IEEE Communications Letters, Vol. 16, No. 9, 2012, pp. 1496-1499. doi:10.1109/LCOMM.2012.073112.121254
|