[1] |
张泽忠 . 通信网的信息安全. 电信科学, 1997, 13 (12): 6~9
|
[2] |
王文彬 . 无线网络安全的相关技术研究与改进. 山东大学硕士学位论文, 2007
|
[3] |
朱建明 . 无线网络安全方法与技术研究. 西安电子科技大学博士学位论文, 2004
|
[4] |
Cyrus P , Seth F . Maximum wireless security. Indianapolis: Sams Publishing, 2002
|
[5] |
胡爱群 . 无线通信网络的安全问题及对策. 电信科学, 2003, 19 (12): 42~45
|
[6] |
Claude B , Alain G , Punya T . Near Shannon limit error-correcting coding and decoding:Turbo-codes.In: Proc IEEE ICC 1993
|
[7] |
Telatar I E . Capacity of multi-antenna Gaussian channels. Europ Trans Telecommun 1999, 10 (6): 585~595
|
[8] |
Paulraj A , Papadias C . Space-time processing for wireless communications. IEEE Signal Processing Magazine 1997, 14 (6): 49~83
|
[9] |
Sendonaris A , Erkip E , Aazhang B . User cooperation diversity part I:system description and part II:implementation aspects and performance analysis.. IEEE Trans Commun 2003, 51 (11): 1927~1948
|
[10] |
Laneman J N , Tse D N C , Wornell G W . Cooperative diversity in wireless networks:efficient protocols and outage behavior. IEEE Trans Inf Theory, 2004, 50 (12): 3062~3080
|
[11] |
龙航, 郑侃, 王方向 等. 协同系统中预编码技术的发展. 电信科学, 2009, 25 (6): 39~44
|
[12] |
王方向, 郑侃, 龙航 等. 多用户预编码技术在中继系统中的应用. 电信科学, 2010, 26 (5): 60~65
|
[13] |
池丽梅 . 计算机通信网络的安全性. 现代电信科技, 1998 (11): 9~11
|
[14] |
孔祥浩 . 关于3G通信网络安全问题的探讨. 电脑与电信, 2010 (1): 34~35
|
[15] |
Shannon C . Communication theory of secrecy systems. Bell Syst Tech J, 1949, 28 (4): 656~715
|
[16] |
Wyner A D . The wire-tap channel. Bell Syst Tech J, 1975, 54 (8): 1355~1387
|
[17] |
Csiszar I , Korner J . Broadcast channels with confidential messages. IEEE Transactions on Information Theory, 1978, 24 (3): 339~348
|
[18] |
Leung-Yan-Cheong S , Hellman M . The Gaussian wire-tap channel. IEEE Transactions on Information Theory, 1978, 24 (4): 451~456
|
[19] |
Ersen Ekrem , Sennur Ulukus . Secrecy capacity of a class of broadcast channels with an eavesdropper. EURASIP Journal on Wireless Communications and Networking, 2009
|
[20] |
Yingbin Liang , Poor H V , Shamai S . Secure communication over fading channels. IEEE Transactions on Information Theory, 2008, 54 (6): 2470~2492
|
[21] |
Khisti A , Tchamkerten A , Wornell G W . Secure broadcasting over fading channels. IEEE Transactions on Information Theory, 2008, 54 (6): 2453~2469
|
[22] |
Tan F Wong , Matthieu B , John M S . Secret sharing over fast-fading MIMO wiretap channels. EURASIP Journal on Wireless Communications and Networking, 2009
|
[23] |
Yingbin Liang , Gerhard K , Poor H V et al. Compound wiretap channels. EURASIP Journal on Wireless Communications and Networking, 2009
|
[24] |
Tie Liu , Shamai S . A note on the secrecy capacity of the multiple-antenna wiretap channel. IEEE Transactions on Information Theory, 2009, 55 (6): 2547~2553
|
[25] |
Lifeng Lai , Hesham E G . The relay-eavesdropper channel:cooperation for secrecy. IEEE Transactions on Information Theory, 2008, 54 (9): 4005~4019
|
[26] |
Aggarwal V , Sankar L , Calderbank A R , et al. Secrecy capacity of a class of orthogonal relay eavesdropper channels. EURASIP Journal on Wireless Communications and Networking, 2009
|
[27] |
Xiang He , Aylin Yener . Two-hop secure communication using an untrusted relay. EURASIP Journal on Wireless Communications and Networking, 2009
|
[28] |
Zhu Han , Ninoslav Marina , Mérouane Debbah , et al. Physical layer security game:interaction between source,eavesdropper and friendly jammer. EURASIP Journal on Wireless Communications and Networking, 2009
|
[29] |
Kashyap A , Basar T , Srikant R . Correlated jamming on MIMO Gaussian fading channels. IEEE Transactions on Information Theory, 2004, 50 (9): 2119~2123
|
[30] |
袁红林, 胡爱群 . 射频指纹的产生机理与惟一性. 东南大学学报(自然科学版), 2009 39 (2): 230~233
|
[31] |
周斌, 邵震洪, 邹菊红 . 卫星通信抗干扰系统中的射频指纹特征识别技术. 电子信息对抗技术, 2010 25 (2): 5~7
|
[32] |
Ellis K J , Serinken N . Characteristics of radio transmitter fingerprints. Radio Science, 2001, 36 (4): 585~597
|
[33] |
Sayeed A , Perrig A . Secure wireless communications:secret keys through multipath.In: Proc IEEE ICASSP 2008
|
[34] |
Koorapaty H , Hassan A A , Chennakeshi S . Secure information transmission for mobile radio. IEEE Commun Letts, 2000, 4 (2): 52~55
|
[35] |
Wilson R , Tse D , Scholtz R . Channel identification:secret sharing using reciprocity in UWB channels. IEEE Trans on Information Forensics and Security, 2007, 2 (3): 364~375
|
[36] |
Gill R Tsouri , Dov Wulich . Securing OFDM over wireless time-varying channels using subcarrier overloading with joint signal constellations. EURASIP Journal on Wireless Communications and Networking, 2009,
|
[37] |
Hassan A A , Stark W E , Hershey J E , et al. Cryptographic key agreement for mobile radio. Digital Signal Processing, 1996, 6 (4): 207~212
|
[38] |
Zhou L , Haas Z . Securing ad hoc networks. IEEE Network Magazine, 1999, 13 (6): 24~30
|
[39] |
Chan H , Perrig A , Song D . Random key predistribution schemes for wireless sensor networks.In: Proc IEEE Symp Security Privacy 2003
|
[40] |
Thangaraj A , Dihidar S , Calderbank A R , et al. Applications of LDPC codes to the wiretap channels. IEEE Transactions on Information Theory, 2007, 53 (8): 2933~2945
|
[41] |
Liu R , Poor V , Spasojevi P . Nested codes for secure transmission.In:Proc IEEE PIMRC 2008, Cannes,France, 2008
|
[42] |
Yanbing Zhang , Huaiyu Dai . A real orthogonal space-time coded UWB scheme for wireless secure communications. EURASIP Journal on Wireless Communications and Networking, 2009
|
[43] |
Kobayashi M , Debbah M , Shamai S . Secured communication over frequency-selective fading channels:a practical Vandermonde precoding. EURASIP Journal on Wireless Communications and Networking, 2009
|