J Huang, A Mukherjee… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
… securetransmission is impossible. On the other hand, when … Huang and AL Swindlehurst, “Robust securetransmission in … outage formulation: A securetransmission design perspective…
YH Chou, GJ Zeng, FJ Lin, CY Chen… - Mobile Networks and …, 2014 - Springer
… networks, telecom companies assist the agent ensuring both sides could receive the other’s secret messages in the transmission … could reduce the number of transmission, so we could …
Y Cai, X Xu, W Yang - Iet Communications, 2016 - Wiley Online Library
… To enhance the securetransmission of the secondary network, we propose a simple and decentralised transmission scheme, which jointly incorporates the secrecy guard zone and …
Y Pei, YC Liang, L Zhang, KC Teh… - … Communications, 2010 - ieeexplore.ieee.org
… In the case when such CSI cannot be obtained perfectly at the SU-Tx, the result provided in this paper can serve as an upper bound of the securetransmission in CRNs. The signals …
G Han, J Jiang, N Sun, L Shu - IEEE communications …, 2015 - ieeexplore.ieee.org
… projects have not taken networksecurity into consideration, … acoustic communication channel (eg, low communication … networks entail the urgent and rapid development of secure …
M Forouzesh, P Azmi… - 2018 9th International …, 2018 - ieeexplore.ieee.org
… In our considered communicationnetwork, the untrusted relay tried to extract the information signal, while the goal of Willie was to detect the presence of the information signal …
… securetransmission design, we consider two antenna array techniques for improving secure … beamforming, and quantify the connectivity improvement over single antenna transmission. …
B Wang, P Mu - IEEE Transactions on Vehicular Technology, 2016 - ieeexplore.ieee.org
… Abstract—This paper studies the securetransmission in a multiuser broadcast channel … to support the securetransmission of one user and the normal (unclassified) transmission of the …
RC Merkle - Communications of the ACM, 1978 - dl.acm.org
… One assumption (that we must transmit a key, by secret … precondition for cryptographically securecommunications is not, … consistent with secret and securecommunications. Finally, the …