|
[1] A. D. Wyner, “The wire-tap channel,” Bell Syst. Tech. J., vol.54. no. 8, pp. 1355-1387, 1975. [2] S. Leung-Yan-Cheong and M. E. Hellman, “The Gaussian wire-tap channel,” IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, 1978. [3] X. Zhou and M. R. McKay, “Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation,” IEEE Trans. Veh. Technol., vol. 59, pp. 3831-3842, 2010. [4] David Tse and Pramod Viswanath, “Fundamentals of Wireless Communication. “Cambridge University Press, 2005. [5] D. Callebaut, “Generalization of the Cauchy-Schwarz inequality,” Journal of mathematical analysis and applications, vol. 12, pp. 491-494, 1965. [6] A. Clark, P. J. Smith, and D. P. Taylor, “Instantaneous capacity of OFDM on Rayleigh-fading channels,” IEEE Trans. Inf. Theory, vol. 53, pp. 355-361, 2007. [7] Y. Tang, J. Xiong, D. Ma, and X. Zhang, “Robust Artificial Noise Aided Transmit Design for MISO Wiretap Channels with Channel Uncertainty,” IEEE Comm. letters., vol. 17, pp. 2096-2099, 2013. [8] N. Romero-Zurita, D. McLernon, M. Ghogho, and A. Swami, “PHY layer security based on protected zone and artificial noise,” IEEE, Signal Processing Letters, vol. 20, pp. 487-490, 2013. [9] J. Barros and M. R. Rodrigues, “Secrecy capacity of wireless channels,” in Proc. IEEE Int. Symp. Inform. Theory, pp. 356-360, 2006. [10] A. Mukherjee and A. L. Swindlehurst, “Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI,” IEEE Transactions on Signal Processing, vol. 59, pp. 351-361, 2011.
|