Baldi M, Bianchi M, Chiaraluce F. Non-systematic codes for physical layer security[C]//Proceedings of 2010 IEEE Information Theory Workshop (ITW). Cairo, Egypt: ITW, 2010:1-5.
[2]
Barros J, Rodrigues M R D. Secrecy capacity of wireless channels[C]//Proceedings of 2006 IEEE International Symposium on Information Theory. Seattle: IEEE, 2006:356-360.
[3]
D. M. C.Error-correction using low-density parity-check codes[D]. Cambridge: University of Cambridge, 1999.
[4]
Romero-Zurita N, Ghogho M, McLernon D. Outage probability based power distribution between data and artificial noise for physical layer security[J]. Signal Processing Letters, 2012,19(2):71-74.
[5]
Wynera D. The wire-tap channel[J]. The Bell System Technical Journal, 1975,54:1355-1387.
[6]
Leung-Yan-Cheong Sand, Hellman M E. The gaussian wire-tap channel[J]. IEEE Transactions on, Information Theory, 1978,24(4):451-456.
[7]
IslamM R, Jinsang K, Arefin M S. MIMOME channel secrecy capacity[C]//Proceedings of 11th International Conference on Computer and Information Technology. [S.l.]: ICCIT, 2008:387-392.
[8]
Oggier Fand, Hassibi B. The secrecy capacity of the MIMO wiretap channel[C]//Proceedings of IEEE International Symposium on Information Theory. [S.l.]: ISIT, 2008:524-528.
[9]
Goel R N S. Guaranteeing secrecy using artificial noise[J]. IEEE Trnsactions on Wireless Communications, 2008,7(6):2180-2189.
[10]
Thangaraj A, Dihidar S, Calderbank A R, et al. Applications of LDPC codes to the wiretap channel[J]. IEEE Transactions on Information Theory, 2007,53(8):2933-2945.
[11]
Baldi M, Bianchi M, Chiaraluce F. Increasing physical layer security through scrambled codes and ARQ[C]//Proceedings of 2011 IEEE International Conference on Communications Workshops (ICC) Kyoto, Japan: ICC2011, 2011:1-5.
[12]
Baldi M, Bianchi M, Chiaraluce F. Coding with scrambling, concatenation, and HARQ for the AWGN wire-tap channel: a security gap analysis[J]. IEEE Transactions onInformation Forensics and Security, 2012,7(3):883-894.
[13]
Weicheng L, Tsunghui C, Wingkin M, et al. QoS-Based transmit beamforming in the presence of eavesdroppers: an optimized artificial-noise-aided approach[J]. IEEE Transactions on Signal Processing, 2011,59(3):1202-1216.