共 21 条
[1]
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
[2]
Dong Lun, 2011, P 46 ANN ALL C URB C, P1132
[3]
Ghosh S., 2011, IEEE, International Conference on Management and Service Science (MASS), P1, DOI DOI 10.1155/2011/693759
[4]
Modeling Location Uncertainty for Eavesdroppers: A Secrecy Graph Approach
[J].
2010 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY,
2010,
:2627-2631
[5]
The Secrecy Graph and Some of its Properties
[J].
2008 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-6,
2008,
:539-543
[6]
Koyluoglu O. O., 2010, IEEE T INFORM THEORY, V58, P3000
[8]
LEUNGYANCHEONG SK, 1978, IEEE T INFORM THEORY, V24, P451, DOI 10.1109/TIT.1978.1055917
[9]
Liang Y., 2008, IEEE Trans. Inf. Theory, V54, P2470
[10]
Secrecy Throughput of MANETs with Malicious Nodes
[J].
2009 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1- 4,
2009,
:1189-+