-
1
-
-
0016562514
-
The wiretap channel
-
Oct
-
A. D. Wyner, "The wiretap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
2
-
-
0017996501
-
The Gaussian wiretap channel
-
Jul
-
S. K. Leung-Yan-Cheong and M. E. Hellman, "The Gaussian wiretap channel," IEEE Trans. Inf. Theory, vol. IT-24, no. 4, pp. 451-456, Jul. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.K.1
Hellman, M.E.2
-
3
-
-
33749450172
-
Secrecy capacity of SIMO and slow fading channels
-
Adelaide, Australia, Sep
-
P. Parada and R. Blahut, "Secrecy capacity of SIMO and slow fading channels," in Proc. IEEE Int. Symp. Information Theory (ISIT , Adelaide, Australia, Sep. 2005, pp. 2152-2155.
-
(2005)
Proc. IEEE Int. Symp. Information Theory (ISIT
, pp. 2152-2155
-
-
Parada, P.1
Blahut, R.2
-
4
-
-
39049144353
-
Secrecy capacity of wireless channels
-
Seattle, WA, Jul
-
J. Barros and M. R. D. Rodrigues, "Secrecy capacity of wireless channels," in Proc. IEEE Int. Symp. Information Theory (ISIT , Seattle, WA, Jul. 2006, pp. 356-360.
-
(2006)
Proc. IEEE Int. Symp. Information Theory (ISIT
, pp. 356-360
-
-
Barros, J.1
Rodrigues, M.R.D.2
-
5
-
-
77954445239
-
Secure communication over fading channels
-
Monticello, IL, Sep
-
Y. Liang and H. V. Poor, "Secure communication over fading channels," in Proc. 44th Annu. Allerton Conf. Communication, Control and Computing, Monticello, IL, Sep. 2006, pp. 817-823.
-
(2006)
Proc. 44th Annu. Allerton Conf. Communication, Control and Computing
, pp. 817-823
-
-
Liang, Y.1
Poor, H.V.2
-
6
-
-
84940654702
-
Secrecy capacity of independent parallel channels
-
Monticello, IL, Sep
-
Z. Li, R. Yates, and W. Trappe, "Secrecy capacity of independent parallel channels," in Proc. 44th Annu. Allerton Conf. Communication, Control and Computing, Monticello, IL, Sep. 2006, pp. 841-848.
-
(2006)
Proc. 44th Annu. Allerton Conf. Communication, Control and Computing
, pp. 841-848
-
-
Li, Z.1
Yates, R.2
Trappe, W.3
-
8
-
-
78650025803
-
The MIMOME channel
-
Monticello, IL, Sep
-
A. Khisti and G. Wornell, "The MIMOME channel," in Proc. 45th Annu. Allerton Conf. Communication, Control and Computing, Monticello, IL, Sep. 2007, pp. 625-632.
-
(2007)
Proc. 45th Annu. Allerton Conf. Communication, Control and Computing
, pp. 625-632
-
-
Khisti, A.1
Wornell, G.2
-
9
-
-
84940667036
-
The secrecy capacity of the MIMO wiretap channel
-
Monticello, IL, Sep
-
F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," in Proc. 45th Annu. Allerton Conf. Communication, Control and Computing, Monticello, IL, Sep. 2007, pp. 848-855.
-
(2007)
Proc. 45th Annu. Allerton Conf. Communication, Control and Computing
, pp. 848-855
-
-
Oggier, F.1
Hassibi, B.2
-
10
-
-
45249089411
-
-
T. Liu and S. Shamai (Shitz), A note on the secrecy capacity of the multi-antenna wiretap channel, IEEE Trans. Inf. Theory, [Online]. Available: http://arxiv.org/PS_cache/arxiv/pdf/0710/ 0710.4105v1.pdf, submitted for publication
-
T. Liu and S. Shamai (Shitz), "A note on the secrecy capacity of the multi-antenna wiretap channel," IEEE Trans. Inf. Theory, [Online]. Available: http://arxiv.org/PS_cache/arxiv/pdf/0710/ 0710.4105v1.pdf, submitted for publication
-
-
-
-
11
-
-
69449086815
-
Towards the secrecy capacity of the Gaussian MIMO wiretap channel:THe 2-2-1 channel
-
submitted for publication
-
S. Shafiee, N. Liu, and S. Ulukus, "Towards the secrecy capacity of the Gaussian MIMO wiretap channel:THe 2-2-1 channel," IEEE Trans. Inf. Theory, submitted for publication.
-
IEEE Trans. Inf. Theory
-
-
Shafiee, S.1
Liu, N.2
Ulukus, S.3
-
12
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
13
-
-
45249090083
-
Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate region
-
Jun
-
R. Liu, I. Maric, P. Spasojevic, and R. Yates, "Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate region," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2493-2507, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2493-2507
-
-
Liu, R.1
Maric, I.2
Spasojevic, P.3
Yates, R.4
-
14
-
-
62749109096
-
Secrecy capacity region of a multi-antenna Gaussian broadcast channel with confidential messages
-
submitted for publication
-
R. Liu and H. V. Poor, "Secrecy capacity region of a multi-antenna Gaussian broadcast channel with confidential messages," IEEE Trans. Inf. Theory, submitted for publication.
-
IEEE Trans. Inf. Theory
-
-
Liu, R.1
Poor, H.V.2
-
16
-
-
0004015843
-
The Capacity of the Degraded Spectral Gaussian Broadcast Channel,
-
Ph.D. dissertation, Stanford Univ, Stanford, CA
-
D. Hughes-Hartogs, "The Capacity of the Degraded Spectral Gaussian Broadcast Channel," Ph.D. dissertation, Stanford Univ., Stanford, CA, 1975.
-
(1975)
-
-
Hughes-Hartogs, D.1
-
17
-
-
0030706705
-
Optimal power allocation over parallel Gaussian broadcast channels
-
Ulm, Germany, Jun
-
D. N. C. Tse, "Optimal power allocation over parallel Gaussian broadcast channels," in Proc. IEEE Int. Symp. Information Theory (ISIT), Ulm, Germany, Jun. 1997, p. 27.
-
(1997)
Proc. IEEE Int. Symp. Information Theory (ISIT)
, pp. 27
-
-
Tse, D.N.C.1
-
18
-
-
0035270116
-
Capacity and optimal resource allocation for fading broadcast channels-Part I: Ergodic capacity
-
Mar
-
L. Li and A. J. Goldsmith, "Capacity and optimal resource allocation for fading broadcast channels-Part I: Ergodic capacity," IEEE Trans. Inf. Theory, vol. 47, no. 3, pp. 1083-1102, Mar. 2001.
-
(2001)
IEEE Trans. Inf. Theory
, vol.47
, Issue.3
, pp. 1083-1102
-
-
Li, L.1
Goldsmith, A.J.2
-
19
-
-
0035271101
-
Capacity and optimal resource allocation for fading broadcast channels-Part II: Outage capacity
-
Mar
-
L. Li and A. J. Goldsmith, "Capacity and optimal resource allocation for fading broadcast channels-Part II: Outage capacity," IEEE Trans. Inf. Theory, vol. 47, no. 3, pp. 1103-1127, Mar. 2001.
-
(2001)
IEEE Trans. Inf. Theory
, vol.47
, Issue.3
, pp. 1103-1127
-
-
Li, L.1
Goldsmith, A.J.2
-
20
-
-
5044251226
-
Capacity and dirty paper coding for Gaussian broadcast channels with common information
-
Chicago, IL, Jun./Jul
-
N. Jindal and A. Goldsmith, "Capacity and dirty paper coding for Gaussian broadcast channels with common information," in Proc. IEEE Int. Symp. Information Theory (ISIT), Chicago, IL, Jun./Jul. 2004, p. 215.
-
(2004)
Proc. IEEE Int. Symp. Information Theory (ISIT)
, pp. 215
-
-
Jindal, N.1
Goldsmith, A.2
-
21
-
-
0026153306
-
A coding theorem for secret sharing communication systems with two Gaussian wiretap channels
-
May
-
H. Yamamoto, "A coding theorem for secret sharing communication systems with two Gaussian wiretap channels," IEEE Trans. Inf. Theory, vol. 37, no. 3, pp. 634-638, May 1991.
-
(1991)
IEEE Trans. Inf. Theory
, vol.37
, Issue.3
, pp. 634-638
-
-
Yamamoto, H.1
-
22
-
-
0032668395
-
Optimal power control over fading channels
-
Jul
-
G. Caire, G. Taricco, and E. Bigheri, "Optimal power control over fading channels," IEEE Trans. Inf. Theory, vol. 45, no. 5, pp. 1468-1489, Jul. 1999.
-
(1999)
IEEE Trans. Inf. Theory
, vol.45
, Issue.5
, pp. 1468-1489
-
-
Caire, G.1
Taricco, G.2
Bigheri, E.3
-
23
-
-
0017495724
-
A note on Wyner's wiretap channel
-
May
-
A. Carleial and M. Hellman, "A note on Wyner's wiretap channel," IEEE Trans. Inf. Theory, vol. IT-23, no. 3, pp. 387-390, May 1977.
-
(1977)
IEEE Trans. Inf. Theory
, vol.IT-23
, Issue.3
, pp. 387-390
-
-
Carleial, A.1
Hellman, M.2
-
24
-
-
0017537504
-
On a special class of wiretap channels
-
Sep
-
S. K. Leung-Yan-Cheong, "On a special class of wiretap channels," IEEE Trans. Inf. Theory, vol. IT-23, no. 5, pp. 625-627, Sep. 1977.
-
(1977)
IEEE Trans. Inf. Theory
, vol.IT-23
, Issue.5
, pp. 625-627
-
-
Leung-Yan-Cheong, S.K.1
-
25
-
-
0024666944
-
Coding theorem for secret sharing communication systems with two noisy channels
-
May
-
H. Yamamoto, "Coding theorem for secret sharing communication systems with two noisy channels," IEEE Trans. Inf. Theory, vol. 35, no. 3, pp. 572-578, May 1989.
-
(1989)
IEEE Trans. Inf. Theory
, vol.35
, Issue.3
, pp. 572-578
-
-
Yamamoto, H.1
-
26
-
-
0031103783
-
On a special class of broadcast channels with confidential messages
-
Mar
-
M. van Dijk, "On a special class of broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 43, no. 2, pp. 712-714, Mar. 1997.
-
(1997)
IEEE Trans. Inf. Theory
, vol.43
, Issue.2
, pp. 712-714
-
-
van Dijk, M.1
-
27
-
-
33646073724
-
An achievable region for the Gaussian wiretap channel with side information
-
May
-
C. Mitrpant, A. J. H. Vinck, and Y. Luo, "An achievable region for the Gaussian wiretap channel with side information," IEEE Trans. Inf. Theory, vol. 52, no. 5, pp. 2181-2190, May 2006.
-
(2006)
IEEE Trans. Inf. Theory
, vol.52
, Issue.5
, pp. 2181-2190
-
-
Mitrpant, C.1
Vinck, A.J.H.2
Luo, Y.3
-
28
-
-
33749427184
-
On an upper bound of the secrecy capacity for a general wiretap channel
-
Adelaide, Australia, Sep
-
H. Koga and N. Sato, "On an upper bound of the secrecy capacity for a general wiretap channel," in Proc. IEEE Int. Symp. Information Theory (ISIT), Adelaide, Australia, Sep. 2005, pp. 1641-1645.
-
(2005)
Proc. IEEE Int. Symp. Information Theory (ISIT)
, pp. 1641-1645
-
-
Koga, H.1
Sato, N.2
-
29
-
-
5044245853
-
Generalized coset schemes for the wiretap channel: Applications to biometrics
-
Chicago, IL, Jun./Jul
-
G. Cohen and G. Zémor, "Generalized coset schemes for the wiretap channel: Applications to biometrics," in Proc. Int. Symp. Information Theory, Chicago, IL, Jun./Jul. 2004, p. 46.
-
(2004)
Proc. Int. Symp. Information Theory
, pp. 46
-
-
Cohen, G.1
Zémor, G.2
-
30
-
-
34547922334
-
Application of LDPC codes to the wiretap channel
-
Aug
-
A. Thangaraj, S. Dihidar, A. R. Calderbank, S. W. McLaughlin, and J.-M. Merolla, "Application of LDPC codes to the wiretap channel," IEEE Trans. Inf. Theory, vol. 53, no. 8, pp. 2933-2945, Aug. 2007.
-
(2007)
IEEE Trans. Inf. Theory
, vol.53
, Issue.8
, pp. 2933-2945
-
-
Thangaraj, A.1
Dihidar, S.2
Calderbank, A.R.3
McLaughlin, S.W.4
Merolla, J.-M.5
-
31
-
-
33645727315
-
General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channel
-
Apr
-
M. Hayashi, "General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channel," IEEE Trans. Inf. Theory, vol. 52, no. 4, pp. 1562-1575, Apr. 2006.
-
(2006)
IEEE Trans. Inf. Theory
, vol.52
, Issue.4
, pp. 1562-1575
-
-
Hayashi, M.1
-
32
-
-
45249092485
-
Secure broadcasting
-
Jun
-
A. Khisti, A. Tchamkerten, and G. Wornell, "Secure broadcasting," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2453-2469, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2453-2469
-
-
Khisti, A.1
Tchamkerten, A.2
Wornell, G.3
-
33
-
-
45249104850
-
Wireless information-theoretic security
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inform. Theory, vol. 54, no. 6, pp. 2515-2534, 2008.
-
(2008)
IEEE Trans. Inform. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
34
-
-
45249114841
-
Secure nested codes for type II wiretap channels
-
Lake Tahoe, CA, Sep
-
R. Liu, Y. Liang, H. V. Poor, and P. Spasojevic, "Secure nested codes for type II wiretap channels," in Proc. IEEE Information Theory Workshop (ITW), Lake Tahoe, CA, Sep. 2007, pp. 337-342.
-
(2007)
Proc. IEEE Information Theory Workshop (ITW)
, pp. 337-342
-
-
Liu, R.1
Liang, Y.2
Poor, H.V.3
Spasojevic, P.4
-
35
-
-
84940647248
-
-
Y. Liang, G. Kramer, H. V. Poor, and S. Shamai (Shitz), Compound wiretap channels, in Proc. 45th Annu. Allerton Conf. Communication, Control and Computing, Monticello, IL, Sep. 2007, pp. 136-143.
-
Y. Liang, G. Kramer, H. V. Poor, and S. Shamai (Shitz), "Compound wiretap channels," in Proc. 45th Annu. Allerton Conf. Communication, Control and Computing, Monticello, IL, Sep. 2007, pp. 136-143.
-
-
-
-
36
-
-
0027629488
-
Common randomness in information theory and cryptography-Part I: Secret sharing
-
Jul
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography-Part I: Secret sharing," IEEE Trans. Inf. Theory vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
37
-
-
0031701886
-
Common randomness in information theory and cryptography-Part II: CR capacity
-
Jan
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography-Part II: CR capacity," IEEE Trans. Inf. Theory, vol. 44, no. 1, pp. 225-240, Jan. 1998.
-
(1998)
IEEE Trans. Inf. Theory
, vol.44
, Issue.1
, pp. 225-240
-
-
Ahlswede, R.1
Csiszár, I.2
-
38
-
-
0027599802
-
Secrete key agreement by public discussion based on common information
-
May
-
U. M. Maurer, "Secrete key agreement by public discussion based on common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.M.1
-
39
-
-
0033891095
-
Common randomness and secret key generation with a helper
-
Mar
-
I. Csiszár and P. Narayan, "Common randomness and secret key generation with a helper," IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 344-366, Mar. 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.2
, pp. 344-366
-
-
Csiszár, I.1
Narayan, P.2
-
40
-
-
10644270917
-
Secrecy capacities for mulitple terminals
-
Dec
-
I. Csiszár and P. Narayan, "Secrecy capacities for mulitple terminals," IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3047-3061, Dec. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.12
, pp. 3047-3061
-
-
Csiszár, I.1
Narayan, P.2
-
41
-
-
33749441153
-
Secrecy capacities for multiterminal channel models
-
Adelaide, Australia, Sep
-
I. Csiszár and P. Narayan, "Secrecy capacities for multiterminal channel models," in Proc. IEEE Int. Symp. Information Theory (ISIT) Adelaide, Australia, Sep. 2005, pp. 2138-2141.
-
(2005)
Proc. IEEE Int. Symp. Information Theory (ISIT)
, pp. 2138-2141
-
-
Csiszár, I.1
Narayan, P.2
-
42
-
-
0034450066
-
From weak to strong information-theoretic key agreement
-
Sorrento, Italy, Jun
-
U. M. Maurer and S. Wolf, "From weak to strong information-theoretic key agreement," in Proc. IEEE Int. Symp. Information Theory (ISIT) Sorrento, Italy, Jun. 2000, p. 18.
-
(2000)
Proc. IEEE Int. Symp. Information Theory (ISIT)
, pp. 18
-
-
Maurer, U.M.1
Wolf, S.2
-
43
-
-
0037396695
-
Secret-key agreement over unauthenticated public channels-Part I. Definitions and a completeness result
-
Apr
-
U. M. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels-Part I. Definitions and a completeness result," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 822-831, Apr. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.4
, pp. 822-831
-
-
Maurer, U.M.1
Wolf, S.2
-
44
-
-
0037399113
-
Secret-key agreement over unauthenticated public channels-Part II. Privacy amplification
-
Apr
-
U. M. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels-Part II. Privacy amplification," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 832-838, Apr. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.4
, pp. 832-838
-
-
Maurer, U.M.1
Wolf, S.2
-
45
-
-
0037396951
-
Secret-key agreement over unauthenticated public channels-Part III. Privacy amplification
-
Apr
-
U. M. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels-Part III. Privacy amplification," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 839-851, Apr. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.4
, pp. 839-851
-
-
Maurer, U.M.1
Wolf, S.2
-
46
-
-
0031647696
-
The common randomness capacity of a pair of independent discrete memoryless channels
-
Jan
-
S. Venkatesan and V. Anantharam, "The common randomness capacity of a pair of independent discrete memoryless channels," IEEE Trans. Inf. Theory, vol. 44, no. 1, pp. 215-224, Jan. 1998.
-
(1998)
IEEE Trans. Inf. Theory
, vol.44
, Issue.1
, pp. 215-224
-
-
Venkatesan, S.1
Anantharam, V.2
-
47
-
-
0033892497
-
The common randomness capacity of a network of discrete memoryless channels
-
Mar
-
S. Venkatesan and V. Anantharam, "The common randomness capacity of a network of discrete memoryless channels," IEEE Trans. Inf. Theory vol. 46, no. 2, pp. 367-387, Mar. 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.2
, pp. 367-387
-
-
Venkatesan, S.1
Anantharam, V.2
-
48
-
-
40949147785
-
Multiple access channels with confidential messages
-
Mar
-
Y. Liang and H. V. Poor, "Multiple access channels with confidential messages," IEEE Trans. Inf. Theory, vol. 54, no. 3, pp. 976-1002, Mar. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.3
, pp. 976-1002
-
-
Liang, Y.1
Poor, H.V.2
-
49
-
-
39049089566
-
The discrete memoryless multiple access channel with confidential messages
-
Seattle, WA, Jul
-
R. Liu, I. Marie, R. Yates, and P. Spasojevic, "The discrete memoryless multiple access channel with confidential messages," in Proc. IEEE Int. Symp. Information Theory (ISIT), Seattle, WA, Jul. 2006, pp. 957-961.
-
(2006)
Proc. IEEE Int. Symp. Information Theory (ISIT)
, pp. 957-961
-
-
Liu, R.1
Marie, I.2
Yates, R.3
Spasojevic, P.4
-
50
-
-
57349093480
-
The Gaussian multiple access wiretap channel
-
submitted for publication
-
E. Tekin and A. Yener, "The Gaussian multiple access wiretap channel," IEEE Trans. Inf. Theory, submitted for publication.
-
IEEE Trans. Inf. Theory
-
-
Tekin, E.1
Yener, A.2
-
51
-
-
84940659555
-
Achievable rates for the general Gaussian multiple access wiretap channel with collective secrecy
-
Monticello, IL, Sep
-
E. Tekin and A. Yener, "Achievable rates for the general Gaussian multiple access wiretap channel with collective secrecy," in Proc. 44th Annu. Allerton Conf. Communication, Control and Computing, Monticello, IL, Sep. 2006, pp. 809-816.
-
(2006)
Proc. 44th Annu. Allerton Conf. Communication, Control and Computing
, pp. 809-816
-
-
Tekin, E.1
Yener, A.2
-
52
-
-
84938932265
-
Coding for relay channels with confidential messages
-
Cairns, Australia, Sep
-
Y. Oohama, "Coding for relay channels with confidential messages," in Proc. IEEE Information Theory Workshop (ITW), Cairns, Australia, Sep. 2001, pp. 87-89.
-
(2001)
Proc. IEEE Information Theory Workshop (ITW)
, pp. 87-89
-
-
Oohama, Y.1
-
53
-
-
51349098469
-
Relay channels with confidential messages
-
to be published
-
Y. Oohama, "Relay channels with confidential messages," IEEE Trans. Information Theory, to be published.
-
IEEE Trans. Information Theory
-
-
Oohama, Y.1
-
54
-
-
51649104090
-
-
L. Lai and H. El Gamal, Cooperative secrecy: The relay-eaves-dropper channel, in Proc. IEEE Int. Symp. Information Theory, Nice, France, Jun. 2007, pp. 931-935, The extended journal version The relay-eavesdropper channel: Cooperation for secrecy, was submitted for publication in IEEE Trans. Inf. Theory..
-
L. Lai and H. El Gamal, "Cooperative secrecy: The relay-eaves-dropper channel," in Proc. IEEE Int. Symp. Information Theory, Nice, France, Jun. 2007, pp. 931-935, The extended journal version "The relay-eavesdropper channel: Cooperation for secrecy," was submitted for publication in IEEE Trans. Inf. Theory..
-
-
-
-
55
-
-
45249103065
-
Secrecy when the relay is the eavesdropper
-
San Diego, CA, Jan, to be published
-
X. He and A. Yener, "Secrecy when the relay is the eavesdropper," in Proc. 3rd Information Theory and Applications Workshop, San Diego, CA, Jan. 2008, to be published.
-
(2008)
Proc. 3rd Information Theory and Applications Workshop
-
-
He, X.1
Yener, A.2
-
56
-
-
45249083184
-
Secure communication with a relay helping the wiretapper
-
Lake Tahoe, CA, Sep
-
M. Yuksel and E. Erkip, "Secure communication with a relay helping the wiretapper," in Proc. IEEE Information Theory Workshop (ITW , Lake Tahoe, CA, Sep. 2007, pp. 595-600.
-
(2007)
Proc. IEEE Information Theory Workshop (ITW
, pp. 595-600
-
-
Yuksel, M.1
Erkip, E.2
-
57
-
-
84940652489
-
-
Y. Liang, A. Somekh-Baruch, H. V. Poor, S. Shamai (Shitz), and S. Verdú, Cognitive interference channels with confidential messages, in Proc. 45th Annu. Allerton Conf. Communication, Control and Computing, Monticello, IL, Sep. 2007, pp. 1-6.
-
Y. Liang, A. Somekh-Baruch, H. V. Poor, S. Shamai (Shitz), and S. Verdú, "Cognitive interference channels with confidential messages," in Proc. 45th Annu. Allerton Conf. Communication, Control and Computing, Monticello, IL, Sep. 2007, pp. 1-6.
-
-
-
-
58
-
-
0003179124
-
Capacity of the product and sum of two unmatched broadcast channels
-
Jan, Mar
-
A. A. El Gamal, "Capacity of the product and sum of two unmatched broadcast channels," Probl. Inf. Transm., vol. 16, no. 1, pp. 1-16, Jan. -Mar. 1980.
-
(1980)
Probl. Inf. Transm
, vol.16
, Issue.1
, pp. 1-16
-
-
El Gamal, A.A.1
-
60
-
-
35148864632
-
Resource allocation for wireless fading relay channels: Max-min solution
-
Oct
-
Y. Liang, V. V. Veeravalli, and H. V. Poor, "Resource allocation for wireless fading relay channels: Max-min solution," IEEE Trans. Inf. Theory, vol. 53, no. 10, pp. 3432-3453, Oct. 2007.
-
(2007)
IEEE Trans. Inf. Theory
, vol.53
, Issue.10
, pp. 3432-3453
-
-
Liang, Y.1
Veeravalli, V.V.2
Poor, H.V.3
|