Author:
Cao Wei,Lei Jing,Hu Weidong,Li Wei
Funder
National Natural Science Foundation of China
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference21 articles.
1. Stallings, W. (2006). Cryptography and network security principles and practices. Englewood Cliffs: Prentice Hall PTR.
2. Bloch, M., & Barros, J. (2011). Physical-layer security: From information theory to security engineering. Cambridge: Cambridge University Press.
3. Shiu, Y.-S., Chang, S. Y., Hsiao-Chun, W., Huang, S. C.-H., & Chen, H.-H. (2011). Physical layer security in wireless networks: A tutorial. IEEE Wireless Communications, 18(2), 66–74.
4. Shannon, C. E. (1949). Communication theory of secrecy systems. Bell System Technical Journal, 28(4), 656715.
5. Mukherjee, A., & Swindlehurst, A. L. (2011). Robust beamforming for security in MIMO wiretap channels with imperfect CSI. IEEE Transactions on Signal Processing, 59(1), 351–361.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献