Identity based key management in mobile ad hoc networks: Techniques and applications, IEEE Trans. Wireless Commun, vol.15, issue.5, pp.46-52, 2008. ,
URL : https://hal.archives-ouvertes.fr/hal-01167540
The general gaussian multiple access and twoway wire-tap channels: achievable rates and cooperative jamming, IEEE Trans. Inform. Theory, vol.54, pp.2735-2751, 2008. ,
Wireless secrecy in cellular systems with infrastructure-aided cooperation, IEEE Trans. Inform. Forensics and Security, vol.4, issue.2, pp.242-256, 2009. ,
Max-ratio relay selection in secure buffer-aided cooperative wireless networks, IEEE Trans. Inform. Forensics and Security, vol.9, issue.4, pp.719-729, 2014. ,
A note on the secrecy capacity of the multipleantenna wiretap channel, IEEE Trans. Information Theory, vol.55, pp.2547-2553, 2009. ,
The capacity region of the degraded multiple-input multiple-output compound broadcast channel, IEEE Trans. Inf. Theory, vol.55, pp.5011-5023, 2009. ,
Physical layer network security in the full-duplex relay system, IEEE Trans. Inform. Forensics and Security, vol.10, issue.3, pp.574-583, 2015. ,
Dual antenna selection in secure cognitive radio networks, IEEE Trans. Veh. Technol, 2016. ,
Secure wireless communications via cooperation, Proc. 46th Ann. Allerton Conf. Communication, Control, and Computing, 2008. ,
Amplify-and-forward based cooperation for secure wireless communications, Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing, 2009. ,
The secrecy graph and some of its properties, Proc. IEEE Int. Symp. Inf. Theory, pp.539-543, 2008. ,
Physical-layer security in stochastic wireless networks, Proc. IEEE Int, pp.974-979, 2008. ,
On the throughput cost of physical layer security in decentralized wireless networks, IEEE Transactions on Wireless Communications, vol.10, pp.2764-2775, 2011. ,
Secrecy rates in broadcast channels with confidential messages and external eavesdroppers, IEEE Trans. on Wireless Commun, vol.13, pp.2931-2943, 2014. ,
On transmission secrecy outage of a multi-antenna system with randomly located eavesdroppers, IEEE Commun. Lett, vol.18, pp.1299-1302, 2014. ,
Physical-layer secrecy of MIMO communications in the presence of a poisson random field of eavesdroppers, Communications Workshops (ICC), 2011 IEEE International Conference on, pp.1-5, 2011. ,
Multiantenna transmission with artificial noise against randomly distributed eavesdroppers, IEEE Trans. on Commun, vol.63, pp.4347-4362, 2015. ,
Applications of self-interference cancellation in 5G and beyond, IEEE Commun. Magazine, vol.52, issue.2, pp.114-121, 2014. ,
Enhancing secrecy with multiantenna transmission in wireless ad hoc networks, IEEE Transactions on Information Forensics and Security, vol.8, pp.1802-1814, 2013. ,
Uncoordinated jammer selection for securing SIMOME wiretap channels: A stochastic geometry approach, IEEE Transactions on Wireless Communications, vol.14, pp.2596-2612, 2015. ,
On the design of artificialnoise-aided secure multi-antenna transmission in slow fading channels, IEEE Transactions on Vehicular Technology, vol.62, pp.2170-2181, 2013. ,
Secure communication in stochastic wireless networks-part I: Connectivity, IEEE Trans. Inf. Forensics and Security, vol.7, pp.125-138, 2012. ,
Table of integrals, series, and products, 2007. ,
5G cellular: key enabling technologies and research challenges, IEEE Instrumentation Measurement Magazine, vol.18, pp.11-21, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01121142