共 15 条
[2]
Boyd S., 2004, CONVEX OPTIMIZATION
[4]
Secure Wireless Communications via Cooperation
[J].
2008 46TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1-3,
2008,
:1132-+
[5]
Dong LuYan Dong LuYan, 2011, Proceedings of the International Conference on pipelines and trenchless technology, Beijing, China, 26-29 October 2011, P1
[9]
LEUNGYANCHEONG SK, 1978, IEEE T INFORM THEORY, V24, P451, DOI 10.1109/TIT.1978.1055917
[10]
COMMUNICATION THEORY OF SECRECY SYSTEMS
[J].
BELL SYSTEM TECHNICAL JOURNAL,
1949, 28 (04)
:656-715