K Cumanan, Z Ding, M Xu… - IEEE Journal of Selected …, 2016 - ieeexplore.ieee.org
… , we propose secrecyrate … a secure communication network consisting of a legitimate user and an eavesdropper, where our goal is to minimize the transmit power with a secrecyrate con…
G Bagherikaram, AS Motahari… - 2008 46th Annual …, 2008 - ieeexplore.ieee.org
… We refer to this scheme as Secure Superposition Coding scheme. The available resources … so that perfect secrecy can be achieved for both layers, and to transmit the messages in the …
Z Li, P Mu, B Wang, X Hu - IEEE Communications Letters, 2015 - ieeexplore.ieee.org
… a new securetransmission scheme under the constraints of transmit power and secrecy … fixes the communication rate and adaptively adjusts the secrecyrate and the transmit power …
… Then we propose a simple cooperative securetransmission strategy, where the source only communicates with relays at the first stage and distributed beamforming is then adopted by …
X Zhou, MR McKay - IEEE Transactions on Vehicular …, 2010 - ieeexplore.ieee.org
… the problem of secure communication with multi-antenna transmission in fading channels. … an achievable secrecyrate in fading channels. The availability of a closed-form secrecyrate …
H Wu, X Tao, Z Han, N Li, J Xu - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
… the achievable secrecyrate at BS0 by optimizing the transmit power for AN at BS0, ie, optimal φ, and simultaneously properly selecting jammers with optimal transmit power for each …
Y Yang, M Guizani - IEEE Journal on Selected Areas in …, 2018 - ieeexplore.ieee.org
… To verify the capability of physical layer security offered by the mapping-varied spatial … of the proposed transmission strategy in the metrics of ergodic secrecyrate and secrecy outage …
… We present an alternative secrecy outage … transmissions fail to achieve perfect secrecy. Using this formulation, we design two transmission schemes that satisfy the given security …
H Ma, J Cheng, X Wang, P Ma - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
… For scenario (b), the secrecyrate based design is not applicable and we consider a QoS based robust securetransmission design to provide security. Our strategy here is to maximize …