[1] Laneman, J. N.; Tse, D. N. C. and Wornell, G. W.; “Cooperative Diversity in Wireless Networks: Efficient Protocols and Outage Behavior,” IEEE Trans. Inf. Theory, Vol. 50, No. 12, pp. 3062–3080, 2004.
[2] Bloch, M.; Barros, J.; Rodriques, M. R. D. and McLaughlin, S. W.; “Wireless Information-Theoretic Security,” IEEE Trans. Inf. Theory, Vol. 54, No. 6, pp. 2515–2534, 2008.
[3] Wyner, A. D.; “The Wire-Tap Channel,” Bell Syst. Tech. J., Vol. 54, No. 8, pp. 1355–1387, 1975.
[4] Huang, J.; Mukherjee, A. and Swindlehurst, A. L.; “Secure Communication via an Untrusted Non- Regenerative Relay in Fading Channels,” IEEE Trans. Signal Process., Vol. 61, No. 10, pp. 2536– 2550, 2013.
[5] He, X. and Yener, A.; “Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming,” in Proc. IEEE Globecom, New Orleans, LA, p. 15, 2008.
[6] He, X. and Yener, A.; “Two-Hop Secure Communication Using an Untrusted Relay,” EURASIP J. Wireless Commun. Netw., p. 13, 2009.
[7] Huang, J.; Mukherjee, A. and Swindlehurst, A. L.; “Outage Performance for Amplify and Forward Channels with an Unauthenticated Relay,” in Proc. IEEE Int. Commun. Conf., pp. 893–897, 2012.
[8] Sun, L.; Zhang, T.; Li, Y. and Niu, H.; “Performance Study of Two-Hop Amplify and Forward Systems with Untrustworthy Relay Nodes,” IEEE Trans. Veh. Technol., Vol. 61, No. 8, pp. 3801–3807, 2012.
[9] Wang, J.; Elkashlan, M.; Huang, J.; Tran, N. H. and Duong, T. Q.; “Secure Transmission with Optimal Power Allocation in Untrusted Relay Networks,” IEEE Wireless Commun. Lett., Vol. 3, No. 3, pp. 289– 292, 2014.
[10] Geraci, G.; Couillet, R.; Yuan, J.; Debbah, M. and Collings, I. B.; “Large System Analysis of Linear Precoding in MISO Broadcast Channels with Confidential Messages,” IEEE J. Sel. Areas Commun., Vol. 31, No. 9, pp. 1660–1671, 2013.
[11] Anghel, P. A. and Kaveh, M.; “Exact Symbol Error Probability of a Cooperative Network in a Rayleigh-Fading Environment,” IEEE Trans. Wireless Commun., Vol. 3, No. 5, pp. 1416–1421, 2004.
[12] Papoulis, A.; “Probability, Random Variables, and Stochastic Processes,” McGraw-Hill, New York, 1984.
[13] Boyd, S. and Vandenberghe. L.; “Convex Optimization,” Cambridge University Press, 2004.
[14] Gradshteyn, I. S. and Ryzhik, I. M.; “Table of Integrals, Series and Products,” Academic, New York, 7th Edition, 2007.