-
1
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 656-715, 1949.
-
(1949)
Bell Syst. Tech. J
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
2
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inform. Theory, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inform. Theory
, pp. 339-348
-
-
Csiszar, I.1
Korner, J.2
-
3
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, 1975.
-
(1975)
Bell Syst. Tech. J
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
4
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inform. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inform. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.M.1
-
5
-
-
84931425598
-
Secret communication using artificial noise
-
Sept
-
R. Negi and S. Goel, "Secret communication using artificial noise," in Proc. VTC Fall 2005, vol. 3, pp. 1906-1910, Sept. 2005.
-
(2005)
Proc. VTC Fall 2005
, vol.3
, pp. 1906-1910
-
-
Negi, R.1
Goel, S.2
-
6
-
-
33847353721
-
Secret communication in presence of colluding eavesdroppers
-
Nov
-
S. Goel and R. Negi, "Secret communication in presence of colluding eavesdroppers," in Proc. MILCOM, vol. 3, pp. 1501-1506, Nov. 2005.
-
(2005)
Proc. MILCOM
, vol.3
, pp. 1501-1506
-
-
Goel, S.1
Negi, R.2
-
7
-
-
0032022195
-
On limits of wireless communications in a fading environment when using multiple antennas
-
Kluwer Academic Press
-
G. J. Foschini and M. J. Gans, "On limits of wireless communications in a fading environment when using multiple antennas," Wireless Personal Commun.: Kluwer Academic Press, no. 6, pp. 311-335, 1998.
-
(1998)
Wireless Personal Commun
, Issue.6
, pp. 311-335
-
-
Foschini, G.J.1
Gans, M.J.2
-
8
-
-
33745490574
-
Space-time transmissions for wireless secret-key agreement with information-theoretic secrecy
-
June
-
X. Li, M. Chen, and E. P. Ratazzl "Space-time transmissions for wireless secret-key agreement with information-theoretic secrecy," in Proc. IEEE SPAWC 2005, pp. 811-815, June 2005.
-
(2005)
Proc. IEEE SPAWC 2005
, pp. 811-815
-
-
Li, X.1
Chen, M.2
Ratazzl, E.P.3
-
9
-
-
0033881606
-
Secure information transmission for mobile radio
-
July
-
H. Koorapaty, A. A. Hassan, and S. Chennakeshu, "Secure information transmission for mobile radio," IEEE Trans. Wireless Commun., pp. 52-55, July 2003.
-
(2003)
IEEE Trans. Wireless Commun
, pp. 52-55
-
-
Koorapaty, H.1
Hassan, A.A.2
Chennakeshu, S.3
-
10
-
-
0347337828
-
Secure space-time communication
-
Dec
-
A. E. Hero, "Secure space-time communication," IEEE Trans. Inform. Theory, pp. 3235-3249, Dec. 2003.
-
(2003)
IEEE Trans. Inform. Theory
, pp. 3235-3249
-
-
Hero, A.E.1
-
11
-
-
0033097504
-
Unconditionally secure key agreement and the Intrinsic conditional information
-
Mar
-
U. M. Maurer and S. Wolf, "Unconditionally secure key agreement and the Intrinsic conditional information," IEEE Trans. Inform. Theory, vol. 45, no. 2, pp. 499-514, Mar. 1999.
-
(1999)
IEEE Trans. Inform. Theory
, vol.45
, Issue.2
, pp. 499-514
-
-
Maurer, U.M.1
Wolf, S.2
-
12
-
-
44049095075
-
Secret communication via multi-antenna transmission
-
Mar, Baltimore, MD
-
Z. Li, W. Trappe, and R. Yates, "Secret communication via multi-antenna transmission," in Proc. CISS '07, pp. 905-910, Mar. 2007, Baltimore, MD.
-
(2007)
Proc. CISS '07
, pp. 905-910
-
-
Li, Z.1
Trappe, W.2
Yates, R.3
-
13
-
-
39049144353
-
Secrecy capacity of wireless channels, to appear In Proc
-
July
-
J. Barros and M. R. D. Rodrigues, "Secrecy capacity of wireless channels," to appear In Proc. ISIT 2006, July 2006.
-
(2006)
ISIT 2006
-
-
Barros, J.1
Rodrigues, M.R.D.2
-
14
-
-
0038005372
-
Multiple-input-multiple-output measurements and modeling In manhattan
-
Apr
-
D. Chizhik, J. Ling, P. W. Wolniansky, R. A. Valenzuela, N. E. Costa, and K. Huber, "Multiple-input-multiple-output measurements and modeling In manhattan," IEEE J. Select. Areas Commun., vol. 21, no. 3, pp. 321-331, Apr. 2003.
-
(2003)
IEEE J. Select. Areas Commun
, vol.21
, Issue.3
, pp. 321-331
-
-
Chizhik, D.1
Ling, J.2
Wolniansky, P.W.3
Valenzuela, R.A.4
Costa, N.E.5
Huber, K.6
-
15
-
-
0004083131
-
Capacity of multi-antenna Gaussian channels
-
Nov
-
E. Telatar, "Capacity of multi-antenna Gaussian channels," Eur. Trans. Telecomm. ETT, vol. 10, no. 6, pp. 585-596, Nov. 1999.
-
(1999)
Eur. Trans. Telecomm. ETT
, vol.10
, Issue.6
, pp. 585-596
-
-
Telatar, E.1
-
16
-
-
0037964276
-
Analysis and performance of some basic spacetime architectures
-
Apr
-
G. J. Foschini, D. Chizhik, M. J. Gans, C. Papadias, and R. A. Valenzuela, "Analysis and performance of some basic spacetime architectures," IEEE J. Select. Areas Commun., special issue on MIMO systems, part I, vol. 21, pp. 303-320, Apr. 2003.
-
(2003)
IEEE J. Select. Areas Commun
, vol.21
, pp. 303-320
-
-
Foschini, G.J.1
Chizhik, D.2
Gans, M.J.3
Papadias, C.4
Valenzuela, R.A.5
-
17
-
-
4544234593
-
Multiple-antenna channel hardening and its implications for rate feedback and scheduling
-
Sept
-
B. M. Hochwald, T. L. Marzetta, and V. Tarokh, "Multiple-antenna channel hardening and its implications for rate feedback and scheduling," IEEE Trans. Inform. Theory, vol. 50, no. 9, pp. 1893-1909, Sept. 2004.
-
(2004)
IEEE Trans. Inform. Theory
, vol.50
, Issue.9
, pp. 1893-1909
-
-
Hochwald, B.M.1
Marzetta, T.L.2
Tarokh, V.3
-
18
-
-
0000602132
-
On the empirical distribution of eigenvalues of a class of large dimensional random matrices
-
J. W. Silverstein and Z. D. Bai, "On the empirical distribution of eigenvalues of a class of large dimensional random matrices," J. Mult. Anal., vol. 54, pp. 175-192, 1995.
-
(1995)
J. Mult. Anal
, vol.54
, pp. 175-192
-
-
Silverstein, J.W.1
Bai, Z.D.2
-
19
-
-
84948960386
-
Information-theoretic key agreement: From weak to strong secrecy for free
-
Springer-Verlag
-
U. Maurer and S. Wolf, "Information-theoretic key agreement: from weak to strong secrecy for free," Lecture Notes in Computer Science, vol. 1807, pp. 352-368, Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1807
, pp. 352-368
-
-
Maurer, U.1
Wolf, S.2
-
20
-
-
5044252003
-
Cooperative diversity in wireless networks: Efficient protocols and outage behavior
-
Dec
-
J. N. Laneman, D. N. C. Tse, and G. W. Wornell, "Cooperative diversity in wireless networks: efficient protocols and outage behavior," IEEE Trans. Inform. Theory, vol. 50, no. 12, pp. 3062-3080, Dec. 2004.
-
(2004)
IEEE Trans. Inform. Theory
, vol.50
, Issue.12
, pp. 3062-3080
-
-
Laneman, J.N.1
Tse, D.N.C.2
Wornell, G.W.3
-
21
-
-
45849139220
-
-
Y. Liang, H. V. Poor, and S. Shamai, Secure communication over fading channels, submitted to IEEE Trans. Inform. Theory, Nov. 2006.
-
Y. Liang, H. V. Poor, and S. Shamai, "Secure communication over fading channels," submitted to IEEE Trans. Inform. Theory, Nov. 2006.
-
-
-
|