E Tekin, A Yener - IEEE Transactions on Information Theory, 2008 - ieeexplore.ieee.org
The general Gaussian multiple-access wiretap channel (GGMAC-WT) and the Gaussian two- way wiretap channel (GTW-WT) are considered. In the GGMAC-WT, multiple users …
We study, in this paper, the secrecy performance of a multi-user (MU) multiple-input single- output visible light communication broadcast channel with confidential messages. The …
In this paper, we examine the secrecy performance of two-way relaying between a large- scale multiple antenna base station (BS) and a single antenna mobile user (MU) in the …
SR Aghdam, TM Duman - IEEE Transactions on Wireless …, 2017 - ieeexplore.ieee.org
We consider precoder and artificial noise (AN) design for multi-antenna wiretap channels under the finite-alphabet input assumption. We assume that the transmitter has access to the …
X Zhou, MR McKay - 2009 3rd International Conference on …, 2009 - ieeexplore.ieee.org
We consider the problem of secure communication in wireless fading channels in the presence of non-colluding passive eavesdroppers. The transmitter has multiple antennas …
Q Li, Y Yang, WK Ma, M Lin, J Ge… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
This paper is concerned with an optimization problem in a two-hop relay wiretap channel, wherein multiple multi-antenna relays collaboratively amplify and forward (AF) information …
Physical (PHY) layer security approaches for wireless communications can prevent eavesdropping without upper layer data encryption. However, they are hampered by …
X Zhou, MR McKay - IEEE Transactions on Vehicular …, 2010 - ieeexplore.ieee.org
We consider the problem of secure communication with multiantenna transmission in fading channels. The transmitter simultaneously transmits an information-bearing signal to the …
Wyner's wiretap channel is generalized to the case when the sender, the receiver and the eavesdropper have multiple antennas. We consider two cases: the deterministic case and …