[1] JEREMY P V,PHILIP S.Expectation-maximization Gaussian-mixture approximate message passing[J].IEEE Transactions on Signal Processing,2013,61(19):4658-4672. [2] XIAO L,GREENSTEIN L,MANDAYAM N,et al.MIMO-assisted channel-based authentication in wireless networks[C]//Proceedings of the 42nd Annual Conference on Information Sciences and Systems.Washington D.C.,USA:IEEE Press,2008:642-646. [3] VISURI S,BOLCSKEI H.MIMO-OFDM multiple access with variable amount of collision[C]//Proceedings of 2004 IEEE International Conference on Communications.Washington D.C.,USA:IEEE Press,2004:286-291. [4] YANG Xiaodong,LI Yanan,ZHOU Qixu,et al.ID-based sever-aided verification proxy re-signature scheme[J].Computer Engineering,2017,43(4):166-170,176.(in Chinese)杨小东,李亚楠,周其旭,等.基于身份的服务器辅助验证代理重签名方案[J].计算机工程,2017,43(4):166-170,176. [5] YU Binbin,HU Liang,CHI Ling.Digital signature scheme against internal and external attack for wireless sensor networks[J].Journal of Jilin University(Engineering and Technology Edition),2019,49(5):1676-1681.(in Chinese)于斌斌,胡亮,迟令.可抵抗内外部攻击的无线传感器网络数字签名方案[J].吉林大学学报(工学版),2019,49(5):1676-1681. [6] PAOLO B,NICOLA L,STEFANO T.Physical layer authentication over MIMO fading wiretap channels[J].IEEE Transactions on Wireless Communications,2012,11(7):2564-2573. [7] YU P L,BARAS J S,SADLER B M.Physical-layer authentication[J].IEEE Transactions on Information Forensics and Security,2008,3(1):38-51. [8] XIAO L,GREENSTEIN L,MANDAYAM N,et al.A physical-layer technique to enhance authentication for mobile terminals[C]//Proceedings of 2008 IEEE Inter-national Conference on Communications.Washington D.C.,USA:IEEE Press,2008:1520-1524. [9] LUN D,ZHU H,PETROPULU A P,et al.Improving wireless physical layer security via cooperating relays[J].IEEE Transactions on Signal Processing,2010,58(3):1875-1888. [10] SADAF S,MOHAMMAD R A.Joint source-channel coding for multiple-access wiretap channels[C]//Proceedings of IEEE International Symposium on Information Theory.Washington D.C.,USA:IEEE Press,2013:369-373. [11] YASSAEE M H,AREF M R.Multiple access wiretap channels with strong secrecy[C]//Proceedings of 2010 IEEE Information Theory Workshop.Washington D.C.,USA:IEEE Press,2010:1-5. [12] ZOU Qinyu,ZHANG Bangning,GUO Daoxing,et al.Physical layer safety communication technology based on reliability mixed restansmission protocol[J].Computer Engineering,2018,44(1):182-186,192.(in Chinese)邹芹宇,张邦宁,郭道省,等.基于可靠度混合重传协议的物理层安全通信技术[J].计算机工程,2018,44(1):182-186,192. [13] LIANG Y B,POOR H V.Multiple-access channels with confidential messages[J].IEEE Transactions on Information Theory,2008,54(3):976-1002. [14] LI L,JINDAL N,GOLDSMITH A.Outage capacities and optimal power allocation for fading multiple-access channels[J].IEEE Transactions onInformation Theory,2005,51(4):1326-1347. [15] MUKHERJEE A,SWINDLEHURST A L.Robust beamforming for security in MIMO wiretap channels with imperfect CSI[J].IEEE Transactions on Signal Processing,2011,59(1):351-361. [16] YU W,CIOFFI J M.Sum capacity of Gaussian vector broadcast channels[J].IEEE Transactions on Information Theory,2004,50(9):1875-1892. [17] ABBAS E G,YOUNG-HAN K.Network information theory[M].London,UK:Cambridge University Press,2011:230-234. [18] MARTINIAN E,WORNELL G W,CHEN B.Authentication with distortion criteria[J].IEEE Transactions on Information Theory,2005,51(7):2523-2542. [19] MAURER U M.Authentication theory and hypothesis testing[J].IEEE Transactions on Information Theory,2000,46(4):1350-1356. [20] COVER T,MCELIECE R,POSNER E.Asynchronous multiple-access channel capacity[J].IEEE Transactions on Information Theory,1981,27(4):409-413. |