[8] 陈莹,王保云,基于信息理论的多用户信道的安全性能研究[D],南京:南京邮电大学,2011.
[9] L.Dong, Z.Han,Secure Wireless Communications via Cooperation[C],Proc. 46th Annual Allerton Conf. Commun., Control, and Computing, Monticello, IL, Sept.2008.
[10] L.Dong, Z.Han,Amplify-and- Forward Based Cooperation for Secure Wireless Communications[C],Proc. IEEE Intl Conf. Acoust. Speech Signal Proc., Taipei, Taiwan, Apr. 2009.
[11] J.Zhang,M.C. Gursoy,Collaborative Relay Beamforming for Secrecy[C],Proc. of the IEEE International Conference on Communication (ICC), Cape Town, South Africa, May 2010.
[12] J.Zhang,M.C. Gursory, Relay Beamforming Strategies for Physical Layer Security[C],44th Annual Conference on Information Sciences and Systems (CISS), 2010.
[13] L.Dong,Z.Han, Improving Wireless Physical Layer Security via Cooperative Relays[J],IEEE Transactions on Signal Processing, vol.58, no.3, pp.1875-1888, Mar. 2010.
[14] S.Goel,R.Negi, Guaranteeing Secrecy Using Artificial Noise[J],IEEE Transactions on Wireless Communications, vol.7, no.6, Jun. 2008.
[15] J.Zhu,J.Mo,Cooperative Secret Communication with Artificial Noise in Symmetric Interference Channel[J],IEEE Communications Letters, vol.14, no.10, Oct. 2010.
[16] R. Zhang,L. Song, Physical Layer Security for Two Way Relay Communications with Friendly Jammers[C],IEEE Global Telecommunications conference,2010.
[17] L.Dong,Z.Han,Cooperative Jamming for Wireless Physical Layer Security[J], IEEE Workshop on Statistical Signal Processing, vol.52,no.4,pp.417–420,2009.
[18] M.Bloch, J.O. Barrors,Wireless Information-Theoretical Security[J],IEEE Thransactions on Information Theory,vol.54,no.6,pp.2515-25,Jun.2008.
[19] 张茂睿,王保云,基于博弈论的中继窃听信道安全性能研究[D],南京:南京邮电大学,2012.
[20] 安思蔚,陈智,多天线抗窃听传输关键技术的研究[D],成都:电子科技大学,2012.
[21] Fakoorian,Swindlehurst,Solutions for the MIMO Gaussian Wiretap channels with a cooperative jammer[J],IEEE Trans.Signal Process,vol.59,no.10,pp.5013-5022,2011. 无线通信网络安全国内外研究现状和参考文献(2):http://www.youerw.com/yanjiu/lunwen_20485.html