|
[1]. 林秉忠、陳彥銘, "無線網路安全白皮書", 台灣電腦網路危機處理暨協調中心 ( TWCERT / CC ) , 2003 [2]. 陳偉康, “淺談「窮舉法」,” 數學教育第三十六期, 2014 [3] Cisco Co., Systems Cisco. Cisco visual networking index: Forecast and methodology, 2017-2022, https://goo.gl/fT2pGW [4] Ben-Jye Chang and Syuan-Hong Liou, “Adaptive cooperative communication for maximizing reliability and reward in ultra-dense small cells LTE-A toward 5G cellular networking,” Computer networks, Vol. 115, pp. 16-28, 2017 [5] Amrita Dubey and Anand Vardhan Bhalla, “An investigation of DAF protocol in wireless communication,” International research journal of engineering and technology, Vol. 04, pp. 1364-1368, 2017 [6] Fengyou Sun and Yuming Jiang, “A Statistical property of wireless channel capacity: theory and application,” ACM SIGMETRICS performance evaluation review, Vol. 45(2), 2017, https://goo.gl/WqEMgN [7] E. C. van der Meulen, “Three-terminal communication channels, ” Advances in applied probability, Vol. 3(1), pp.120–154, 1971 [8] Thomas Cover and Abbas El Gamal, “Capacity theorems for the relay channel, ” IEEE transactions on information theory, Vol. 25(5), 1979 [9] Sendonaris, Elza Erkip, and Behnaam Aazhang, “User cooperation diversity part I: system description,” IEEE transactions on communications, Vol. 51(11), pp. 1927–1938, Nov. 2003 [10] Yao-Win Hong, Wan-Jen Huang, Fu-Hsuan Chiu, and C.-C. Jay Kuo, “Cooperative communications in resource-constrained wireless networks, ” IEEE signal processing magazine, Vol. 24(3), pp. 47–57, May 2007 [11] Nosratinia Aria, Todd E. Hunter, and Ahmadreza Hedayat, “Cooperative communication in wireless networks,” IEEE communications magazine, Vol. 42(10), pp. 74–80, Oct. 2004 [12] Chirag Patel and Gordon L. Stüber, “Channel estimation for amplify and forward relay based cooperation diversity systems,” IEEE transactions on wireless communications, Vol. 6(6), pp.2348-2356, 2007 [13] Gurpreet Singh, "A study of encryption algorithms (RSA, DES, 3DES and AES) for information security," International journal of computer applications, Vol. 67(19), pp. 33-38, 2013 [14] Da Silva, Eduardo and Dluiz Carlos P. Albini, "Identity-based key management in mobile ad hoc networks: techniques and applications," IEEE wireless communications, Vol. 15(5), pp.46-52, 2008 [15] Yingbin Liang, H. Vincent Poor and Lei Ying, "Wireless broadcast networks: reliability, security, and stability," Proceedings of the 3rd workshop on information theory and applications, pp. 249-255, 2008 [16] Yin Wang and Guevara Noubir, "Distributed cooperation and diversity for hybrid wireless networks," IEEE transactions on mobile computing, Vol. 12(3), pp. 596-608, 2013 [17] Ioannis Krikidis, John S. Thompson and Steve McLaughlin, "Relay selection for secure cooperative networks with jamming," IEEE transactions on wireless communications, Vol. 8(10), pp. 5003-5011, 2009 [18] Vijay Garg, “Wireless communications & networking.,” Morgan Kaufmann, 2010 [19] Claude E. Shannon, "Communication theory of secrecy systems." Bell labs technical journal, Vol. 28(4), pp. 656-715, 1949 [20] Claude E. Shannon, “Communication in the presence of noise." Proceedings of the IRE, Vol. 37(1), pp. 10-21. 1949 [21] Elzbieta Beres and Raviraj Adve, "Selection cooperation in multi-source cooperative networks," IEEE transactions on wireless communications, Vol. 7(1), pp. 118-127, 2008 [22] Laneman , J. Nicholas and Gregory W. Wornell , “Distributed space-time coded protocols for exploiting cooperative diversity in wireless networks,” IEEE transactions on Information theory, Vol. 49(10), pp. 2415–2425, 2003 [23] Yang, Cheng-Ying, Yi-Shan Lin and Jyh-Horng Wen, "Greedy algorithm applied to relay selection for cooperative communication systems in amplify-and-forward mode," Journal of electronic science and technology, Vol. 12(1), pp. 49-53, 2014
|