Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0
1

Year Published

2016
2016
2017
2017

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 14 publications
0
4
0
1
Order By: Relevance
“…The GSVD scheme's performance was then further investigated in the fading scenario and the corresponding secrecy capacity was shown to approach zero if and only if the ratio of the number of eavesdropper antennas to source antennas was larger than two. Additionally, in [123], Chrysikos et al investigated the wireless information-theoretic security in terms of outage secrecy capacity, which is used for characterizing the maximum secrecy rate under a given outage probability requirement. A closed-form expression of the outage secrecy capacity was derived in [123] by using the first-order Taylor series for approximation of an exponential function.…”
Section: A Information-theoretic Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…The GSVD scheme's performance was then further investigated in the fading scenario and the corresponding secrecy capacity was shown to approach zero if and only if the ratio of the number of eavesdropper antennas to source antennas was larger than two. Additionally, in [123], Chrysikos et al investigated the wireless information-theoretic security in terms of outage secrecy capacity, which is used for characterizing the maximum secrecy rate under a given outage probability requirement. A closed-form expression of the outage secrecy capacity was derived in [123] by using the first-order Taylor series for approximation of an exponential function.…”
Section: A Information-theoretic Securitymentioning
confidence: 99%
“…Additionally, in [123], Chrysikos et al investigated the wireless information-theoretic security in terms of outage secrecy capacity, which is used for characterizing the maximum secrecy rate under a given outage probability requirement. A closed-form expression of the outage secrecy capacity was derived in [123] by using the first-order Taylor series for approximation of an exponential function.…”
Section: A Information-theoretic Securitymentioning
confidence: 99%
“…In [18], the closed-form expression for the Outage Secrecy Capacity was provided, allowing for the exact calculation of the maximum achievable secrecy rate for an upper-bound value of Outage Probability. This was accomplished via a Taylor series approximation of the exponential function, which was proven to be reliable for realistic values of the Secrecy Rate.…”
Section: Wireless Information-theoretic Securitymentioning
confidence: 99%
“…If the Outage Probability assumes a predefined fixed value, then the Secrecy Rate will be a variable under investigation and the bounds of accepted values will determine the robustness of the proposed solution. This is part of immediate future work, which consists of calculating the Outage Secrecy Capacity on the basis of the closed-form expression provided in [18], employing the measured SNR values from this work (multiple eavesdroppers scheme).…”
Section: Outage Probabilitymentioning
confidence: 99%
“…Η κλειστή µορφή της µαθηµατικής σχέσης για την Αποκοπή Χωρητικότητας Ασφαλείας για δεδοµένη πιθανότητα αποκοπής p δίδεται από [71]:…”
Section: )unclassified