1. Wyner A D. The wire-tap channel. Bell System Technical Journal, 1975, 54(8): 1355?1387
2. Xie J W, Ulukus S. Secure degrees of freedom of the Gaussian wiretap channel with helpers. Proceedings of the 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton’12), Oct 1?5, 2012, Monticello, IL, USA. Piscataway, NJ, USA: IEEE, 2012: 193?200
3. Xie J W, Ulukus S. Secure degrees of freedom of the Gaussian wiretap channel with helpers and no eavesdropper CSI: blind cooperative jamming. Proceedings of the 47th Annual Conference on Information Sciences and Systems (CISS’13), Mar 20?22, 2013, Baltimore, MD, USA. Piscataway, NJ, USA: IEEE, 2013: 5p
4. Ozel O, Ekrem E, Ulukus S. Gaussian wiretap channel with an amplitude constraint. Proceedings of the IEEE Information Theory Workshop (ITW’12), Sept 3?7, 2012, Lausanne, Switzerland. Piscataway, NJ, USA: IEEE, 2012: 139?143
5. Bassily R, Ulukus S. Deaf cooperation and relay selection strategies for secure communication in multiple relay networks. IEEE Transactions on Signal Processing, 2013, 61(6): 1544?1554
6. Khisti A, Wornell G, Wiesel A, et al. On the Gaussian MIMO wiretap channel. Proceedings of the IEEE International Symposium on Information Theory (ISIT’07), Jun 24?29, 2007, Nice, France. Piscataway, NJ, USA: IEEE, 2007: 2471?2475
7. Liu T, Shamai S. A note on secrecy capacity of the multiple-antenna wiretap channel. IEEE Transactions on Information Theory, 2009, 55(6): 2547?2553
8. Oggier F, Hassibi B. The secrecy capacity of the MIMO wiretap channel. IEEE Transactions on Information Theory, 2011, 57(8): 4961?4972
9. Bustin R, Liu R H, Poor H V, et al. An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel. Proceedings of the IEEE International Symposium on Information Theory (ISIT’09), Jun 28?Jul 3, 2009, Seoul, Republic of Korea. Piscataway, NJ, USA: IEEE, 2009: 2602?2606
10. Ekrem E, Ulukus S. The secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel. IEEE Transactions on Information Theory, 2011, 57(4): 2083?2114
11. Ekrem E, Ulukus S. Capacity-equivocation region of the Gaussian MIMO wiretap channel. IEEE Transactions on Information Theory, 2012, 58(9): 5699?5710
12. Shafiee S, Liu N, Ulukus S. Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: the 2-2-1 channel. IEEE Transactions on Information Theory, 2009, 55(9): 4033?4039
13. Fakoorian S A A, Swindlehurst A L. Dirty paper coding versus linear GSVD-based precoding in MIMO broadcast channel with confidential messages. Proceedings of the 2001 IEEE Global Telecommunications Conference (GLOBECOM’11), Dec 5?9, 2011, Houston, TX, USA. Piscataway, NJ, USA: IEEE, 2011: 5p
14. Fakoorian S A A, Swindlehurst A L. Optimal power allocation for GSVD-based beamforming in the MIMO Gaussian wiretap channel. Proceedings of the 2012 IEEE International Symposium on Information Theory (ISIT’12), Jul 1?6, 2012, Cambridge, MA, USA. Piscataway, NJ, USA: IEEE, 2012: 2321?2325
15. Hhisti A, Wornell G W. Secure transmission with multiple antennas I: the MISOME wiretap channel. IEEE Transactions on Information Theory, 2010, 56(7): 3088?3104
16. Hhisti A, Wornell G W. Secure transmission with multiple antennas, Part II: the MIMOME wiretap channel. IEEE Transactions on Information Theory, 2010, 56(11): 5515?5532
17. Yan S, Wang W B. Physical layer security strategies for downlink heterogeneous cloud radio access networks. The Journal of China Universities of Posts and Telecommunications, 2014, 21(5): 47?54
18. Gene H G, Van Loan C F. Matrix computations.3nd ed. Baltimore, MD, USA: Johns Hopkins University Press, 1996
|