ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 0908.0898
  4. Cited By
On Secrecy Capacity Scaling in Wireless Networks
v1v2 (latest)

On Secrecy Capacity Scaling in Wireless Networks

6 August 2009
O. O. Koyluoglu
C. E. Koksal
H. El Gamal
ArXiv (abs)PDFHTML

Papers citing "On Secrecy Capacity Scaling in Wireless Networks"

13 / 13 papers shown
Title
On the Security Analysis of a Cooperative Incremental Relaying Protocol
  in the Presence of an Active Eavesdropper
On the Security Analysis of a Cooperative Incremental Relaying Protocol in the Presence of an Active Eavesdropper
Saeed Vahidian
Sajad Hatamnia
B. Champagne
24
8
0
31 Jul 2018
Energy-Efficient Secrecy in Wireless Networks Based on Random Jamming
Energy-Efficient Secrecy in Wireless Networks Based on Random Jamming
A. Sheikholeslami
Majid Ghaderi
H. Pishro-Nik
Dennis Goeckel
22
11
0
15 Mar 2017
Physical Layer Security-Aware Routing and Performance Tradeoffs in Ad
  Hoc Networks
Physical Layer Security-Aware Routing and Performance Tradeoffs in Ad Hoc Networks
Yang Xu
Jia Liu
Yulong Shen
Xiaohong Jiang
T. Taleb
45
7
0
08 Sep 2016
Secrecy Capacity in Large Cooperative Networks in Presence of
  Eavesdroppers with Unknown Locations
Secrecy Capacity in Large Cooperative Networks in Presence of Eavesdroppers with Unknown Locations
A. H. Hadavi
Narges Kazempour
Mahtab Mirmohseni
M. R. Aref
15
2
0
17 Apr 2016
When Does Relay Transmission Give a More Secure Connection in Wireless
  Ad Hoc Networks?
When Does Relay Transmission Give a More Secure Connection in Wireless Ad Hoc Networks?
Chunxiao Cai
Yueming Cai
Xiangyun Zhou
Weiwei Yang
Wendong Yang
57
51
0
06 Jan 2014
Secrecy Transmission Capacity in Noisy Wireless Ad Hoc Networks
Secrecy Transmission Capacity in Noisy Wireless Ad Hoc Networks
Jinxiao Zhu
Yin Chen
Yulong Shen
O. Takahashi
Xiaohong Jiang
N. Shiratori
65
16
0
20 Dec 2013
Constrained Colluding Eavesdroppers: An Information-Theoretic Model
Constrained Colluding Eavesdroppers: An Information-Theoretic Model
Mahtab Mirmohseni
Panos Papadimitratos
43
2
0
11 Dec 2013
Secrecy Capacity Scaling in Large Cooperative Wireless Networks
Secrecy Capacity Scaling in Large Cooperative Wireless Networks
Mahtab Mirmohseni
Panos Papadimitratos
44
3
0
11 Dec 2013
Efficient Wireless Security Through Jamming, Coding and Routing
Efficient Wireless Security Through Jamming, Coding and Routing
Majid Ghaderi
Dennis Goeckel
A. Orda
Mostafa Dehghan
43
19
0
09 Apr 2013
Secure Degrees of Freedom of the Gaussian Wiretap Channel with Helpers
  and No Eavesdropper CSI: Blind Cooperative Jamming
Secure Degrees of Freedom of the Gaussian Wiretap Channel with Helpers and No Eavesdropper CSI: Blind Cooperative Jamming
Jianwei Xie
S. Ulukus
74
47
0
26 Feb 2013
Generalized Secure Transmission Protocol for Flexible Load-Balance
  Control with Cooperative Relays in Two-Hop Wireless Networks
Generalized Secure Transmission Protocol for Flexible Load-Balance Control with Cooperative Relays in Two-Hop Wireless Networks
Yulong Shen
Xiaohong Jiang
Jianfeng Ma
45
4
0
09 Jan 2013
Exploring Relay Cooperation Scheme for Load-Balance Control in Two-hop
  Secure Communication System
Exploring Relay Cooperation Scheme for Load-Balance Control in Two-hop Secure Communication System
Yulong Shen
Xiaohong Jiang
Jianfeng Ma
74
0
0
29 Dec 2012
Secure Degrees of Freedom of One-hop Wireless Networks
Secure Degrees of Freedom of One-hop Wireless Networks
Jianwei Xie
S. Ulukus
344
145
0
24 Sep 2012
1