Tài liệu tham khảo |
Loại |
Chi tiết |
[1] Thomas M. cover, Joy A. Thomas (2006), “Elements of information theory”, John Wiley & Sons, INC., Canada |
Sách, tạp chí |
Tiêu đề: |
Elements of information theory |
Tác giả: |
Thomas M. cover, Joy A. Thomas |
Năm: |
2006 |
|
[2] J. Ma, G. Li, and B. H. Juang (2009), “Signal processing in cognitive radio,” Proc. IEEE, vol. 97, no. 5, pp. 805-823 |
Sách, tạp chí |
Tiêu đề: |
Signal processing in cognitive radio,” "Proc. IEEE |
Tác giả: |
J. Ma, G. Li, and B. H. Juang |
Năm: |
2009 |
|
[3] K. B. Letaief and W. Zhang (2009), “Cooperative communications for cognitive radio networks,” Proc. IEEE, vol. 97, no. 5, pp. 878-893 |
Sách, tạp chí |
Tiêu đề: |
Cooperative communications for cognitive radio networks,” "Proc. IEEE |
Tác giả: |
K. B. Letaief and W. Zhang |
Năm: |
2009 |
|
[4] C. E. Shannon (1948), “A Mathematical Theory of Communication”, The Bell System Technical Journal, 27, 379-423, 623-656 |
Sách, tạp chí |
Tiêu đề: |
A Mathematical Theory of Communication”, "The Bell System Technical Journal |
Tác giả: |
C. E. Shannon |
Năm: |
1948 |
|
[5] Ueli M. Maurer (1993), “Secret Key Agreement by Public Discussion from Common Information”, IEEE Transactions on Information Theory, 39 (3), 733-742 |
Sách, tạp chí |
Tiêu đề: |
Secret Key Agreement by Public Discussion from Common Information”, "IEEE Transactions on Information Theory |
Tác giả: |
Ueli M. Maurer |
Năm: |
1993 |
|
[6] R. Ahlswede and I. Csiszar (1993), “Common randomness in information theory and cryptography’’, Part I: secret sharing”, IEEE Transactions on Information Theory, 39 (4), 1121-1132 |
Sách, tạp chí |
Tiêu đề: |
Common randomness in information theory and cryptography’’, Part I: secret sharing”, "IEEE Transactions on Information Theory |
Tác giả: |
R. Ahlswede and I. Csiszar |
Năm: |
1993 |
|
[7] A. A. Hassan W. E. Stark J. E. Hershey and S. Chennakeshu (1996), “Cryptographic Key Agreement for Mobile Radio”, Digital Signal Processing 6, 207-212 |
Sách, tạp chí |
Tiêu đề: |
Cryptographic Key Agreement for Mobile Radio”, "Digital Signal Processing 6 |
Tác giả: |
A. A. Hassan W. E. Stark J. E. Hershey and S. Chennakeshu |
Năm: |
1996 |
|
[8] C. Ye, A. Reznik and Y. Shah (2006), “Extracting secrecy from jointly Gaussian random variables”, Proc. Int. Symp. Inf. Theory, 2593-2597 |
Sách, tạp chí |
Tiêu đề: |
Extracting secrecy from jointly Gaussian random variables”, "Proc. Int. Symp. Inf. Theory |
Tác giả: |
C. Ye, A. Reznik and Y. Shah |
Năm: |
2006 |
|
[9] N. Patwari, J. Croft, S. Jana, and Sneha K. Kasera (2010), “Highrate Uncorrelated bit extraction for shared secretkey generation from channelmeasurements”, IEEE Transactions on Mobile Computing, 9 (1), 17-30 |
Sách, tạp chí |
Tiêu đề: |
Highrate Uncorrelated bit extraction for shared secretkey generation from channelmeasurements”, "IEEE Transactions on Mobile Computing |
Tác giả: |
N. Patwari, J. Croft, S. Jana, and Sneha K. Kasera |
Năm: |
2010 |
|
[10] S. Mathur, W. Trappe, N. Mandayam, C. Ye and A. Reznik (2008),“Radiotelepathy: extracting a secret key from an unauthenticated wireless channel”, in Proc. MOBICOM, 128-139 |
Sách, tạp chí |
Tiêu đề: |
Radiotelepathy: extracting a secret key from an unauthenticated wireless channel”, "in Proc. MOBICOM |
Tác giả: |
S. Mathur, W. Trappe, N. Mandayam, C. Ye and A. Reznik |
Năm: |
2008 |
|
[11] H. Koorapaty, A. Hassan and S. Chennakeshu (2000), “Secure information transmission for mobile radio”, IEEE Commun. Lett., 4(2), 52-55 |
Sách, tạp chí |
Tiêu đề: |
Secure information transmission for mobile radio”, "IEEE Commun. Lett |
Tác giả: |
H. Koorapaty, A. Hassan and S. Chennakeshu |
Năm: |
2000 |
|
[12] A. Sayeed and A. Perrig (2008), “Secure wireless communications: secret keys through multipath”, in Proc. ICASSP, 3013-3016 |
Sách, tạp chí |
Tiêu đề: |
Secure wireless communications: secret keys through multipath”, "in Proc |
Tác giả: |
A. Sayeed and A. Perrig |
Năm: |
2008 |
|
[13] A. Chorti (2012), “Helping interferer physical layer security strategies for MQAM and M-PSK systems”, in Proc. CISS, 1-6 |
Sách, tạp chí |
Tiêu đề: |
Helping interferer physical layer security strategies for MQAM and M-PSK systems”, "in Proc |
Tác giả: |
A. Chorti |
Năm: |
2012 |
|
[14] A. Wyner (1975), “The wire-tap channel”, Bell Syst. Tech. J., 54 (8), 1355- 1387 |
Sách, tạp chí |
Tiêu đề: |
The wire-tap channel”, "Bell Syst. Tech. J |
Tác giả: |
A. Wyner |
Năm: |
1975 |
|
[15] I. Csiszar and J. Korner (1978), “Broadcast channels with confidential messages”, IEEE Transactions on Information Theory, 24 (3), 339-348 |
Sách, tạp chí |
Tiêu đề: |
Broadcast channels with confidential messages”, "IEEE Transactions on Information Theory |
Tác giả: |
I. Csiszar and J. Korner |
Năm: |
1978 |
|
[16] C. E. Shannon (1949), “Communication theory of secrecy systems”, Bell Syst.Tech. J., 28, 656-715 |
Sách, tạp chí |
Tiêu đề: |
Communication theory of secrecy systems”, "Bell Syst.Tech. J |
Tác giả: |
C. E. Shannon |
Năm: |
1949 |
|
[17] J. Barros and M. Rodrigues (2006), “Secrecy capacity of wireless channels”, in ISIT06, 356-360 |
Sách, tạp chí |
Tiêu đề: |
Secrecy capacity of wireless channels”, "in ISIT06 |
Tác giả: |
J. Barros and M. Rodrigues |
Năm: |
2006 |
|
[18] T.-Q. Duong, V. N. Q. Bao, and H.-J.Zepemick, (2009) “On the performance of selection decode-and-forward relay networks over Nakagami-m fading channels”, IEEE Commun.Lett., vol. 13, no. 3, pp. 172- 174 |
Sách, tạp chí |
Tiêu đề: |
On the performance of selection decode-and-forward relay networks over Nakagami-m fading channels”, "IEEE Commun.Lett |
|
[19] Hung Tran, Hans-Jurgen Zepernick, and Hoc Phan (2013) “Cognitive Proactive and Reactive DF Relaying Schemes under Joint Outage and Peak Transmit Power Constraints” IEEE Communications Letters, vol.17, no. 8, 1548- 1551 |
Sách, tạp chí |
Tiêu đề: |
Cognitive Proactive and Reactive DF Relaying Schemes under Joint Outage and Peak Transmit Power Constraints” "IEEE Communications Letters |
|