Journal articles on the topic 'Physical-layer security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Physical-layer security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Poor, H. Vincent, and Rafael F. Schaefer. "Wireless physical layer security." Proceedings of the National Academy of Sciences 114, no. 1 (December 27, 2016): 19–26. http://dx.doi.org/10.1073/pnas.1618130114.
Full textMucchi, Lorenzo, Sara Jayousi, Stefano Caputo, Erdal Panayirci, Shahriar Shahabuddin, Jonathan Bechtold, Ivan Morales, Razvan-Andrei Stoica, Giuseppe Abreu, and Harald Haas. "Physical-Layer Security in 6G Networks." IEEE Open Journal of the Communications Society 2 (2021): 1901–14. http://dx.doi.org/10.1109/ojcoms.2021.3103735.
Full textPfeiffer, Johannes, and Robert F. H. Fischer. "Multilevel Coding for Physical-Layer Security." IEEE Transactions on Communications 70, no. 3 (March 2022): 1999–2009. http://dx.doi.org/10.1109/tcomm.2022.3145578.
Full textBloch, Matthieu, Merouane Debbah, Yingbin Liang, Yasutada Oohama, and Andrew Thangaraj. "Special issue on physical-layer security." Journal of Communications and Networks 14, no. 4 (August 2012): 349–51. http://dx.doi.org/10.1109/jcn.2012.6292260.
Full textHuo, Yan, Yuqi Tian, Liran Ma, Xiuzhen Cheng, and Tao Jing. "Jamming Strategies for Physical Layer Security." IEEE Wireless Communications 25, no. 1 (February 2018): 148–53. http://dx.doi.org/10.1109/mwc.2017.1700015.
Full textHumble, Travis. "Quantum security for the physical layer." IEEE Communications Magazine 51, no. 8 (August 2013): 56–62. http://dx.doi.org/10.1109/mcom.2013.6576339.
Full textTrappe, Wade. "The challenges facing physical layer security." IEEE Communications Magazine 53, no. 6 (June 2015): 16–20. http://dx.doi.org/10.1109/mcom.2015.7120011.
Full textSaad, Walid, Xiangyun Zhou, Mérouane Debbah, and H. Vincent Poor. "Wireless physical layer security [Guest Editorial]." IEEE Communications Magazine 53, no. 12 (December 2015): 18. http://dx.doi.org/10.1109/mcom.2015.7355560.
Full textKuljanski-Marić, Sonja. "LDPC codes for physical layer security." Vojnotehnicki glasnik 66, no. 4 (2018): 900–919. http://dx.doi.org/10.5937/vojtehg66-14776.
Full textEfstathiou, Dimitrios. "A collaborative physical layer security scheme." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 3 (June 1, 2019): 1924. http://dx.doi.org/10.11591/ijece.v9i3.pp1924-1934.
Full textYaacoub, Elias. "Physical Layer Security in Military Communications." International Journal of Mobile Computing and Multimedia Communications 10, no. 4 (October 2019): 26–40. http://dx.doi.org/10.4018/ijmcmc.2019100103.
Full textLiang, Yingbin, H. Vincent Poor, and Shlomo Shamai Shitz. "Physical layer security in broadcast networks." Security and Communication Networks 2, no. 3 (May 2009): 227–38. http://dx.doi.org/10.1002/sec.110.
Full textYang, Wenjun, Qinghe Du, Zhiwei Liu, Meng Wang, and Pinyi Ren. "Development of Physical Layer Security Simulation Platform." Procedia Computer Science 187 (2021): 495–500. http://dx.doi.org/10.1016/j.procs.2021.04.089.
Full textLee, Eun-Kyu, Mario Gerla, and Soon Oh. "Physical layer security in wireless smart grid." IEEE Communications Magazine 50, no. 8 (August 2012): 46–52. http://dx.doi.org/10.1109/mcom.2012.6257526.
Full textSkorin-Kapov, Nina, Marija Furdek, Szilard Zsigmond, and Lena Wosinska. "Physical-layer security in evolving optical networks." IEEE Communications Magazine 54, no. 8 (August 2016): 110–17. http://dx.doi.org/10.1109/mcom.2016.7537185.
Full textWang, Hui-Ming, Tong-Xing Zheng, Jinhong Yuan, Don Towsley, and Moon Ho Lee. "Physical Layer Security in Heterogeneous Cellular Networks." IEEE Transactions on Communications 64, no. 3 (March 2016): 1204–19. http://dx.doi.org/10.1109/tcomm.2016.2519402.
Full textZou, Yulong. "Physical-Layer Security for Spectrum Sharing Systems." IEEE Transactions on Wireless Communications 16, no. 2 (February 2017): 1319–29. http://dx.doi.org/10.1109/twc.2016.2645200.
Full textBasciftci, Yuksel Ozan, Can Emre Koksal, and Alexei Ashikhmin. "Physical-Layer Security in TDD Massive MIMO." IEEE Transactions on Information Theory 64, no. 11 (November 2018): 7359–80. http://dx.doi.org/10.1109/tit.2018.2855058.
Full textGong, Shiqi, Chengwen Xing, Sheng Chen, and Zesong Fei. "Polarization Sensitive Array Based Physical-Layer Security." IEEE Transactions on Vehicular Technology 67, no. 5 (May 2018): 3964–81. http://dx.doi.org/10.1109/tvt.2017.2773710.
Full textChen, Jianchao, Liang Yang, and Mohamed-Slim Alouini. "Physical Layer Security for Cooperative NOMA Systems." IEEE Transactions on Vehicular Technology 67, no. 5 (May 2018): 4645–49. http://dx.doi.org/10.1109/tvt.2017.2789223.
Full textZhang, Wei, Jian Chen, Yonghong Kuo, and Yuchen Zhou. "Transmit Beamforming for Layered Physical Layer Security." IEEE Transactions on Vehicular Technology 68, no. 10 (October 2019): 9747–60. http://dx.doi.org/10.1109/tvt.2019.2932753.
Full textSasaki, Masahide, Hiroyuki Endo, Mikio Fujiwara, Mitsuo Kitamura, Toshiyuki Ito, Ryosuke Shimizu, and Morio Toyoshima. "Quantum photonic network and physical layer security." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 375, no. 2099 (June 26, 2017): 20160243. http://dx.doi.org/10.1098/rsta.2016.0243.
Full textZhang, Zhenyu, Anas Chaaban, and Lutz Lampe. "Physical layer security in light-fidelity systems." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 378, no. 2169 (March 2, 2020): 20190193. http://dx.doi.org/10.1098/rsta.2019.0193.
Full textTrulove, James. "Wired and Wireless Physical Layer Security Issues." Information Systems Security 10, no. 2 (May 2001): 1–9. http://dx.doi.org/10.1201/1086/43314.10.2.20010506/31403.8.
Full textZheng, Gan, Pantelis-Daniel Arapoglou, and Bjorn Ottersten. "Physical Layer Security in Multibeam Satellite Systems." IEEE Transactions on Wireless Communications 11, no. 2 (February 2012): 852–63. http://dx.doi.org/10.1109/twc.2011.120911.111460.
Full textNusenu, Shaddrack Yaw, Wen‐Qin Wang, and Jie Xiong. "Time‐modulated FDA for physical‐layer security." IET Microwaves, Antennas & Propagation 11, no. 9 (June 22, 2017): 1274–79. http://dx.doi.org/10.1049/iet-map.2016.0930.
Full textEsat Ankaralı, Z., and Hüseyin Arslan. "Cyclic feature suppression for physical layer security." Physical Communication 25 (December 2017): 588–97. http://dx.doi.org/10.1016/j.phycom.2016.09.003.
Full textMelki, Reem, Hassan N. Noura, Mohammad M. Mansour, and Ali Chehab. "A survey on OFDM physical layer security." Physical Communication 32 (February 2019): 1–30. http://dx.doi.org/10.1016/j.phycom.2018.10.008.
Full textFu, Xiaomei, Ling Li, and Qun Zong. "Bayesian Coalitional Game in Physical Layer Security." Wireless Personal Communications 85, no. 3 (June 30, 2015): 1237–50. http://dx.doi.org/10.1007/s11277-015-2837-9.
Full textEfstathiou, Dimitrios. "ENHANCING PHYSICAL LAYER SECURITY OF OFDM SYSTEMS." Far East Journal of Electronics and Communications 18, no. 2 (March 21, 2018): 317–36. http://dx.doi.org/10.17654/ec018020317.
Full textZhang, Ning, Dajiang Chen, Feng Ye, Tong-Xing Zheng, and Zhiqing Wei. "Physical Layer Security for Internet of Things." Wireless Communications and Mobile Computing 2019 (April 18, 2019): 1–2. http://dx.doi.org/10.1155/2019/2627938.
Full textKamel, Mahmoud, Walaa Hamouda, and Amr Youssef. "Physical Layer Security in Ultra-Dense Networks." IEEE Wireless Communications Letters 6, no. 5 (October 2017): 690–93. http://dx.doi.org/10.1109/lwc.2017.2731840.
Full textWang, Xin, Qilian Liang, Jiasong Mu, Wei Wang, and Baoju Zhang. "Physical layer security in wireless smart grid." Security and Communication Networks 8, no. 14 (March 12, 2013): 2431–39. http://dx.doi.org/10.1002/sec.751.
Full textTopal, Ozan Alp, Mehmet Ozgun Demir, Zekai Liang, Ali Emre Pusane, Guido Dartmann, Gerd Ascheid, and Gunes Karabulut Kur. "A Physical Layer Security Framework for Cognitive Cyber-Physical Systems." IEEE Wireless Communications 27, no. 4 (August 2020): 32–39. http://dx.doi.org/10.1109/mwc.01.1900543.
Full textNagamani, K., and R. Monisha. "Physical Layer Security Using Cross Layer Authentication for AES-ECDSA Algorithm." Procedia Computer Science 215 (2022): 380–92. http://dx.doi.org/10.1016/j.procs.2022.12.040.
Full textMyung, Jungho, Hwanjo Heo, and Jongdae Park. "Joint Beamforming and Jamming for Physical Layer Security." ETRI Journal 37, no. 5 (October 1, 2015): 898–905. http://dx.doi.org/10.4218/etrij.15.2415.0002.
Full textZeng, Yao, Yuxi Tang, and Luping Xiang. "Physical Layer Security Design for Polar Code Construction." Cryptography 6, no. 3 (July 4, 2022): 35. http://dx.doi.org/10.3390/cryptography6030035.
Full textLiau, Qian, Chee Leow, and Zhiguo Ding. "Physical Layer Security Using Two-Path Successive Relaying." Sensors 16, no. 6 (June 9, 2016): 846. http://dx.doi.org/10.3390/s16060846.
Full textKumar, Megha S., R. Ramanathan, M. Jayakumar, and Devendra Kumar Yadav. "Secret Key Generation Schemes for Physical Layer Security." Defence Science Journal 71, no. 4 (July 1, 2021): 545–55. http://dx.doi.org/10.14429/dsj.71.15403.
Full textChaganti, Rajasekhar, Deepti Gupta, and Naga Vemprala. "Intelligent Network Layer for Cyber-Physical Systems Security." International Journal of Smart Security Technologies 8, no. 2 (July 2021): 42–58. http://dx.doi.org/10.4018/ijsst.2021070103.
Full textSun, Li, Kamel Tourki, Yafei Hou, and Lu Wei. "Safeguarding 5G Networks through Physical Layer Security Technologies." Wireless Communications and Mobile Computing 2018 (September 25, 2018): 1–2. http://dx.doi.org/10.1155/2018/7503735.
Full textBadarneh, Osamah S., Paschalis C. Sofotasios, Sami Muhaidat, Simon L. Cotton, Khaled M. Rabie, and Naofal Aldhahir. "Achievable Physical-Layer Security Over Composite Fading Channels." IEEE Access 8 (2020): 195772–87. http://dx.doi.org/10.1109/access.2020.3033893.
Full textLuo, Xuewen, Yiliang Liu, Hsiao-Hwa Chen, and Qing Guo. "Physical Layer Security in Intelligently Connected Vehicle Networks." IEEE Network 34, no. 5 (September 2020): 232–39. http://dx.doi.org/10.1109/mnet.011.1900628.
Full textZhihui Shu, Yi Qian, and Song Ci. "On physical layer security for cognitive radio networks." IEEE Network 27, no. 3 (May 2013): 28–33. http://dx.doi.org/10.1109/mnet.2013.6523805.
Full textLiu, Jiajia, Zhihong Liu, Yong Zeng, and Jianfeng Ma. "Cooperative Jammer Placement for Physical Layer Security Enhancement." IEEE Network 30, no. 6 (November 2016): 56–61. http://dx.doi.org/10.1109/mnet.2016.1600119nm.
Full textSaad, Walid, Xiangyun Zhou, Merouane Debbah, and H. Vincent Poor. "Wireless physical layer security: Part 1 [Guest Editorial]." IEEE Communications Magazine 53, no. 6 (June 2015): 15. http://dx.doi.org/10.1109/mcom.2015.7120010.
Full textChen, Xiaoming, Caijun Zhong, Chau Yuen, and Hsiao-Hwa Chen. "Multi-antenna relay aided wireless physical layer security." IEEE Communications Magazine 53, no. 12 (December 2015): 40–46. http://dx.doi.org/10.1109/mcom.2015.7355564.
Full textWang, Chao, and Hui-Ming Wang. "Physical Layer Security in Millimeter Wave Cellular Networks." IEEE Transactions on Wireless Communications 15, no. 8 (August 2016): 5569–85. http://dx.doi.org/10.1109/twc.2016.2562010.
Full textYang, Qian, Hui-Ming Wang, Yi Zhang, and Zhu Han. "Physical Layer Security in MIMO Backscatter Wireless Systems." IEEE Transactions on Wireless Communications 15, no. 11 (November 2016): 7547–60. http://dx.doi.org/10.1109/twc.2016.2604800.
Full textShiu, Yi-Sheng, Shih Chang, Hsiao-Chun Wu, Scott Huang, and Hsiao-Hwa Chen. "Physical layer security in wireless networks: a tutorial." IEEE Wireless Communications 18, no. 2 (April 2011): 66–74. http://dx.doi.org/10.1109/mwc.2011.5751298.
Full text