【正文】
4, 1978.[11] I. Csisz180。ar and J. Korner, “Broadcast channels with confidential messages,”IEEE Trans. Inf. Theory, vol. 24, 1978.[12] Z. Li, W. Trappe, and R. Yates, “Secret munication via multiantennatransmission,” in Proc. Conf. Inform. Sciences and Systems,2007.[13] S. Shafiee and S. Ulukus, “Achievable rates in Gaussian MISO channelswith secrecy constraints,” in Proc. IEEE International Symp. Inform.Theory, 2007.[14] A. Khisti and G. Wornell, “Secure transmission with multiple antennas–part I: the MISOME wiretap channel,” IEEE Trans. Inf. Theory, vol. 56,2010.[15] S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEETrans. Wireless Commun., vol. 7, 2008.[16] A. Khisti and G. Wornell, “The MIMOME channel,” in Proc. AllertonConf. Commun., Control, and Computing, 2007.[17] F. Oggier and B. Hassibi, “The secrecy capacity of the MIMO wiretapchannel,” in Proc. IEEE International Symp. Inform. Theory, 2008.[18] T. Liu and S. Shamai, “A note on the secrecy capacity of the multiantennawiretap channel,” IEEE Trans. Inf. Theory, vol. 55, 2009.[19] P. Gopala, L. Lai, and H. El Gamal, “On the secrecy capacity of fadingchannels,” IEEE Trans. Inf. Theory, vol. 54, 2008.[20] Y. Liang, H. Poor, and S. Shamai, “Secure munication over fadingchannels,” IEEE Trans. Inf. Theory, vol. 54, 2008.[21] Z. Li, R. Yates, and W. Trappe, “Secrecy capacity of independent parallelchannels,” 2006.[22] M. Bloch, J. Barros, M. Rodrigues, and S. McLaughlin, “Wirelessinformationtheoretic security,” IEEE Trans. Inf. Theory, vol. 54, 2008.[23] R. Ahlswede and I. Csisz180。ar, “Common randomness in informationtheory and cryptography–I: secret sharing,” IEEE Trans. Inf. Theory,vol. 39, 1993.[24] U. M. Maurer, “Secret key agreement by public discussion frommon information” IEEE Trans. Inf. Theory, vol. 39, 1993.[25] L. Lai, H. El Gamal, and H. Poor, “The wiretap channel with feedback:encryption over the channel,” IEEE Trans. Inf. Theory, vol. 54, 2008.[26] E. Tekin and A. Yener, “The general Gaussian multipleaccess and twowaywiretap channels: achievable rates and cooperative jamming,” IEEETrans. Inf. Theory, vol. 54, 2008.[27] X. He and A. Yener, “On the role of feedback in twoway secure munication,”in Proc. Asilomer Conf. Signals, Systems and Computers,2008.[28] S. Bashar and Z. Ding, “Optimum power allocation against informationleakage in wireless network,” in Proc. IEEE Conf. Global TeleCommun.,2009.[29] A. Reznik, Y. Shah, and S. Goldberg, “Enhancing wireless systemsecurity with PHYlayer techniques,” in Proc. Wireless World ResearchForum, 2007.[30] E. Larsson and P. Stoica, SpaceTime Block Coding for Wireless Communications.Cambridge University Press, 2003.[31] A. Edelman and N. Rao, “Random matrix theory,” Acta Numerica,vol. 14, 2005.[32] T. Mathew and K. Nordstr168。om, “Wishart and chisquare distributions associatedwith matrix quadratic forms,” J. Multivariate Analysis, vol. 61,1997.[33] J. Proakis and M. Salehi, Digital Communications. McGrawHill, 1995.[34] S. Jafar and S. Srinivasa, “On the optimality of beamforming withquantized feedback,” IEEE Trans. Commun., vol. 55, 2007.[35] P. Xia, S. Zhou, and G. Giannakis, “Achieving the Welch bound withdifference sets,” IEEE Trans. Inf. Theory, vol. 51, 2005.[36] Available online: ,