[1] A D Wyner.The wire-tap channel[J].Bell Syst Tech J,1975,54(8):1355-1387.
[2] I Csiszar,et al.Broadcast channels with confidential messages[J].IEEE Transactions on Information Theory,1978,24(3):339-348.
[3] S K Leung-Yan-Cheong,et al.The Gaussian wiretap channel[J].IEEE Trans Inf Theory,1978,24(4):451-456.
[4] Y Liang,et al.Secure communication over fading channels[J].IEEE Transactions on Information Theory,2008,54(6):2470-2492.
[5] P K Gopala,et al.On the secrecy capacity of fading channels[J].IEEE Trans Inf Theory,2008,54(10):4687-4698.
[6] I Krikidis.Opportunistic relay selection for cooperative networks with secrecy constraints[J].IET Commun,2010,4(15):1787-1791.
[7] I Krikidis,et al.Relay selection for secure cooperative networks with jamming[J].IEEE Transactions on Wireless Communications,2009,8(10):5003-5011.
[8] B Rankov,et al.Achievable rate regions for the two way relay channel[A].Proceedings of IEEE International Symposium on Information Theory[C].Seattle:IEEE,2006.1668-1672.
[9] L Dong,et al.Improving wireless physical layer security via cooperating relays[J].IEEE Transactions on Signal Processing,2010,58(3):1875-1888.
[10] J Chen,et al.Joint relay and jammer selection for secure two-way relay networks[J].IEEE Transactions On Information Forensic and Security,2012,7(1):310-320. |