2012 IEEE International Workshop on Information Forensics and Security (WIFS) 2012
DOI: 10.1109/wifs.2012.6412659
|View full text |Cite
|
Sign up to set email alerts
|

Non-regenerative two-hop wiretap channels using interference neutralization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2013
2013
2014
2014

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 17 publications
0
6
0
Order By: Relevance
“…Denote the non-zero columns of P i byP i ∈ C M ×S i . The information leakage constraint (21) is equivalent to For each i, we stack the constrains for all j = i by using G H −i from (18) We write (34) as…”
Section: Secrecy Rates With Larger Systemsmentioning
confidence: 99%
See 2 more Smart Citations
“…Denote the non-zero columns of P i byP i ∈ C M ×S i . The information leakage constraint (21) is equivalent to For each i, we stack the constrains for all j = i by using G H −i from (18) We write (34) as…”
Section: Secrecy Rates With Larger Systemsmentioning
confidence: 99%
“…Stacking the matrices in (34) for all i, we obtain A vec(R) = b. The matrix A is a block matrix with vertically stacked blocks P T i F T i ⊗ G H −i , for i = 1, .…”
Section: Proof Of Propositionmentioning
confidence: 99%
See 1 more Smart Citation
“…With symbol extensions, aligned interference neutralisation, a mix of alignment and neutralisation, can be applied [6]. Our prior works show that signal leakage neutralisation is effective in improving secrecy rates in a conventional four‐node set‐up and multi‐carrier relay‐assisted interference channel (IRC) [40, 41]. In our prior works, perfect channel state information (CSI) is assumed to be available at all nodes.…”
Section: Introductionmentioning
confidence: 99%
“…IN has been applied to eliminate interference in various systems [13,18,19] including instantaneous relay channels [20]. Our prior work shows that IN is effective in improving secrecy rates in a two-hop wiretap channel [21]. The proposed method in this paper differs The wireless relay-assisted network with layer one repeaters and one smart relay is shown in subfigure (a).…”
Section: Introductionmentioning
confidence: 99%