Sciweavers

PIMRC
2010
IEEE
13 years 10 months ago
A secrecy game with an informed jammer relay
A four terminal Gaussian network composed of a source, a destination, an eavesdropper and a jammer relay is investigated when the jammer relay is causally given the source message....
Melda Yuksel, Xi Liu, Elza Erkip
GLOBECOM
2008
IEEE
14 years 7 months ago
Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming
—We consider a source-destination pair that can communicate only through an unauthenticated intermediate relay node. In this two-hop communication scenario, where the cooperation...
Xiang He, Aylin Yener