메뉴 건너뛰기




Volumn , Issue , 2007, Pages 404-413

The Gaussian multiple access wire-tap channel: Wireless secrecy and cooperative jamming

Author keywords

[No Author keywords available]

Indexed keywords

ACHIEVABLE RATES; CAPACITY REGIONS; CODE-WORDS; GAUSSIAN; GAUSSIAN CODEBOOKS; GAUSSIAN MULTIPLE ACCESS CHANNELS; MULTI-ACCESS; MULTIPLE ACCESS; MULTIPLE USERS; NUMERICA L RESULTS; OUTER BOUNDS; POWER ALLOCATIONS; SUM-CAPACITY; WIRE-TAP CHANNEL;

EID: 48049102969     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ITA.2007.4357611     Document Type: Conference Paper
Times cited : (39)

References (29)
  • 1
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon, "Communication theory of secrecy systems," Bell Sys. Tech. J., vol. 28, pp. 656-715, 1949.
    • (1949) Bell Sys. Tech. J , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 2
    • 0016562514 scopus 로고
    • The wire-tap channel
    • A. Wyner, "The wire-tap channel," Bell Sys. Tech. J., vol. 54, pp. 1355-1387, 1975.
    • (1975) Bell Sys. Tech. J , vol.54 , pp. 1355-1387
    • Wyner, A.1
  • 3
    • 0017495724 scopus 로고
    • A note on Wyner's wiretap channel
    • May
    • A. B. Carleial and M. E. Hellman, "A note on Wyner's wiretap channel," IEEE Tram. Inform. Theory, vol. 23, no. 3, pp. 387-390, May 1977.
    • (1977) IEEE Tram. Inform. Theory , vol.23 , Issue.3 , pp. 387-390
    • Carleial, A.B.1    Hellman, M.E.2
  • 5
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inform. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inform. Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 6
    • 84948960386 scopus 로고    scopus 로고
    • Information-theoretic key agreement: From weak to strong secrecy for free
    • Springer-Verlag
    • U. Maurer and S. Wolf, "Information-theoretic key agreement: From weak to strong secrecy for free," in Proceedings of EURO CRYPT 2000, Lecture Notes in Computer Science, vol. 1807. Springer-Verlag, 2000, pp. 351-368.
    • (2000) Proceedings of EURO CRYPT 2000, Lecture Notes in Computer Science , vol.1807 , pp. 351-368
    • Maurer, U.1    Wolf, S.2
  • 7
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inform. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
    • (1993) IEEE Trans. Inform. Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.M.1
  • 9
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography, part I: Secret sharing
    • July
    • R. Ahslwede and I. Csiszár, "Common randomness in information theory and cryptography, part I: Secret sharing," IEEE Trans. Inform. Theory, vol. 39, no. 4, pp. 1121-1132, July 1993.
    • (1993) IEEE Trans. Inform. Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahslwede, R.1    Csiszár, I.2
  • 10
    • 0031701886 scopus 로고    scopus 로고
    • Common randomness in information theory and cryptography, part II: CR capacity
    • January
    • _ , "Common randomness in information theory and cryptography, part II: CR capacity," IEEE Trans. Inform, Theory, vol. 44, no. 1, pp. 225-240, January 1998.
    • (1998) IEEE Trans. Inform, Theory , vol.44 , Issue.1 , pp. 225-240
    • Ahslwede, R.1    Csiszár, I.2
  • 11
    • 0033891095 scopus 로고    scopus 로고
    • Common randomness and secret key generation with a helper
    • March
    • I. Csiszár and P. Narayan, "Common randomness and secret key generation with a helper," IEEE Trans. Inform. Theory, vol. 46, no. 2, pp. 344-366, March 2000.
    • (2000) IEEE Trans. Inform. Theory , vol.46 , Issue.2 , pp. 344-366
    • Csiszár, I.1    Narayan, P.2
  • 12
    • 10644270917 scopus 로고    scopus 로고
    • Secrecy capacities for multiple terminals
    • December
    • _ , "Secrecy capacities for multiple terminals," IEEE Trans. Inform. Theory, vol. 50, no. 12, pp. 3047-3061, December 2004.
    • (2004) IEEE Trans. Inform. Theory , vol.50 , Issue.12 , pp. 3047-3061
    • Csiszár, I.1    Narayan, P.2
  • 13
    • 0031647696 scopus 로고    scopus 로고
    • The common randomness capacity of a pair of independent discrete memoryless channels
    • January
    • S. Venkatesan and V. Anantharam, "The common randomness capacity of a pair of independent discrete memoryless channels," IEEE Trans. Inform. Theory, vol. 44, no. 1, pp. 215-224, January 1998.
    • (1998) IEEE Trans. Inform. Theory , vol.44 , Issue.1 , pp. 215-224
    • Venkatesan, S.1    Anantharam, V.2
  • 14
    • 0033892497 scopus 로고    scopus 로고
    • The common randomness capacity of a network of discrete memoryless channels
    • March
    • _ , "The common randomness capacity of a network of discrete memoryless channels," IEEE Trans. Inform. Theory, vol. 46, no. 2, pp. 367-387, March 2000.
    • (2000) IEEE Trans. Inform. Theory , vol.46 , Issue.2 , pp. 367-387
    • Venkatesan, S.1    Anantharam, V.2
  • 15
    • 0022722755 scopus 로고
    • On secret sharing communication systems with two or three channels
    • May
    • H. Yamamoto, "On secret sharing communication systems with two or three channels," IEEE Trans. Inform. Theory, vol. 32, no. 3, pp. 387-393, May 1986.
    • (1986) IEEE Trans. Inform. Theory , vol.32 , Issue.3 , pp. 387-393
    • Yamamoto, H.1
  • 16
    • 0026153306 scopus 로고
    • A coding theorem for secret sharing communication systems with two Gaussian wiretap channels
    • May
    • _ , "A coding theorem for secret sharing communication systems with two Gaussian wiretap channels," IEEE Trans. Inform. Theory, vol. 37, no. 3, pp. 634 - 638, May 1991.
    • (1991) IEEE Trans. Inform. Theory , vol.37 , Issue.3 , pp. 634-638
    • Yamamoto, H.1
  • 17
    • 84938932265 scopus 로고    scopus 로고
    • Coding for relay channels with confidential messages
    • Y. Oohama, "Coding for relay channels with confidential messages," in Proc. IEEE Inform. Theory Workshop (ITW), 2001, pp. 87 - 89.
    • (2001) Proc. IEEE Inform. Theory Workshop (ITW) , pp. 87-89
    • Oohama, Y.1
  • 19
    • 77954445239 scopus 로고    scopus 로고
    • Secure communication over fading channels
    • Monticello, IL, September 27-29
    • Y Liang and V. Poor, "Secure communication over fading channels," in Proc. Allerton Conf. Commun., Contr, Comput., Monticello, IL, September 27-29 2006.
    • (2006) Proc. Allerton Conf. Commun., Contr, Comput
    • Liang, Y.1    Poor, V.2
  • 21
    • 84940648008 scopus 로고    scopus 로고
    • Discrete memoryless interference and broadcast channels with confidential messages
    • Monticello, IL, September 27-29
    • R. Liu, I. Marie, R. D. Yates, and P. Spasojevic, "Discrete memoryless interference and broadcast channels with confidential messages," in Proc. Allerton Conf. Commun., Contr., Comput., Monticello, IL, September 27-29 2006.
    • (2006) Proc. Allerton Conf. Commun., Contr., Comput
    • Liu, R.1    Marie, I.2    Yates, R.D.3    Spasojevic, P.4
  • 22
    • 48049088523 scopus 로고    scopus 로고
    • Y. Liang and V. Poor, Generalized multiple access channels with confidential messages, IEEE Trans. Inform. Theory, submitted for publication, conference version presented at ISIT'06. [Online.] Available: http://arxiv.org/format/cs.IT/0605014.
    • Y. Liang and V. Poor, "Generalized multiple access channels with confidential messages," IEEE Trans. Inform. Theory, submitted for publication, conference version presented at ISIT'06. [Online.] Available: http://arxiv.org/format/cs.IT/0605014.
  • 24
    • 33847609636 scopus 로고    scopus 로고
    • On secure signaling for the Gaussian multiple access wire-tap channel
    • Asilomar, CA, November
    • E. Tekin, S. Şerbetli, and A. Yener, "On secure signaling for the Gaussian multiple access wire-tap channel," in Proc. ASILOMAR Conf. Sig., Syst, Comp., Asilomar, CA, November 2005.
    • (2005) Proc. ASILOMAR Conf. Sig., Syst, Comp
    • Tekin, E.1    Şerbetli, S.2    Yener, A.3
  • 25
    • 39049168628 scopus 로고    scopus 로고
    • The Gaussian multiple-access wire-tap channel with collective secrecy constraints
    • Seattle, WA, July 9-14
    • E. Tekin and A. Yener, "The Gaussian multiple-access wire-tap channel with collective secrecy constraints," in Proc. IEEE Int. Symp. Inform. Theory (ISIT), Seattle, WA, July 9-14, 2006.
    • (2006) Proc. IEEE Int. Symp. Inform. Theory (ISIT)
    • Tekin, E.1    Yener, A.2
  • 26
    • 57349093480 scopus 로고    scopus 로고
    • The Gaussian multiple-access wire-tap channel
    • submitted for publication, Online, Available
    • _ , "The Gaussian multiple-access wire-tap channel," IEEE Trans. Inform Theory, submitted for publication, [Online.] Available: http://arxiv.org/format/cs.IT/0605028.
    • IEEE Trans. Inform Theory
    • Tekin, E.1    Yener, A.2
  • 27
    • 84940659555 scopus 로고    scopus 로고
    • Achievable rates for the general gaussian multiple access wire-tap channel with collective secrecy
    • Monticello, IL, September 27-29
    • _ , "Achievable rates for the general gaussian multiple access wire-tap channel with collective secrecy," in Proc. Allerton Conf. Commun., Contr., Comput, Monticello, IL, September 27-29 2006.
    • (2006) Proc. Allerton Conf. Commun., Contr., Comput
    • Tekin, E.1    Yener, A.2
  • 28
    • 46749101382 scopus 로고    scopus 로고
    • The general Gaussian multiple-access and two-way wire-tap channels: Achievable rates and cooperative jamming
    • submitted for publication February
    • _ , "The general Gaussian multiple-access and two-way wire-tap channels: Achievable rates and cooperative jamming," IEEE Trans. Inform. Theory, submitted for publication February 2007.
    • (2007) IEEE Trans. Inform. Theory
    • Tekin, E.1    Yener, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.