-
1
-
-
84890522850
-
Communication theory of secrecy systems
-
Oct
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 656-715, Oct. 1949.
-
(1949)
Bell Syst. Tech. J
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
2
-
-
0016562514
-
The wire-tap channel
-
Oct
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
-
3
-
-
0009801824
-
Information-theoretic key agreement: From weak to strong secrecy for free
-
Bruges Brugge, Belgium, May
-
U. M. Maurer and S. Wolf, "Information-theoretic key agreement: From weak to strong secrecy for free," in Proc. Advances in Cryptology-EUROCRYPT, Bruges (Brugge), Belgium, May 2000, pp. 356-373.
-
(2000)
Proc. Advances in Cryptology-EUROCRYPT
, pp. 356-373
-
-
Maurer, U.M.1
Wolf, S.2
-
4
-
-
0017996501
-
The Gaussian wiretap channel
-
Jul
-
S. K. Leung-Yan-Cheong and M. E. Hellman, "The Gaussian wiretap channel," IEEE Trans. Inf. Theory, vol. IT-24, no. 4, pp. 451-456, Jul. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.K.1
Hellman, M.E.2
-
5
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
6
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.M.1
-
7
-
-
0027629488
-
Common randomness in information theory and cryptography, Part I: Secret sharing
-
Jul
-
R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography, Part I: Secret sharing," IEEE Trans. Inf. Theory vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszár, I.2
-
8
-
-
0033891095
-
-
Csiszár and P. Narayan, Common randomness and secret key generation with a helper, IEEE Trans. Inf. Theory, 46, no. 2, pp. 344-366, Mar. 2000.
-
Csiszár and P. Narayan, "Common randomness and secret key generation with a helper," IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 344-366, Mar. 2000.
-
-
-
-
9
-
-
10644270917
-
Secrecy capacities for multiple terminals
-
Dec
-
I. Csiszár and P. Narayan, "Secrecy capacities for multiple terminals," IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3047-3061, Dec. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.12
, pp. 3047-3061
-
-
Csiszár, I.1
Narayan, P.2
-
10
-
-
0037396695
-
Secret key agreement over a nonauthenticated channel-Part I: Definitions and bounds
-
Apr
-
U. M. Maurer and S. Wolf, "Secret key agreement over a nonauthenticated channel-Part I: Definitions and bounds," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 822-831, Apr. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.4
, pp. 822-831
-
-
Maurer, U.M.1
Wolf, S.2
-
11
-
-
0037399113
-
Secret key agreement over a nonauthenticated channel-Part II: The simulatability condition
-
Apr
-
U. M. Maurer and S. Wolf, "Secret key agreement over a nonauthenticated channel-Part II: The simulatability condition," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 832-838, Apr. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.4
, pp. 832-838
-
-
Maurer, U.M.1
Wolf, S.2
-
12
-
-
0037396951
-
Secret key agreement over a nonauthenticated channel-Part III: Privacy amplification
-
Apr
-
U. M. Maurer and S. Wolf, "Secret key agreement over a nonauthenticated channel-Part III: Privacy amplification," IEEE Trans. Inf. Theory vol. 49, no. 4, pp. 839-851, Apr. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.4
, pp. 839-851
-
-
Maurer, U.M.1
Wolf, S.2
-
13
-
-
40949121595
-
Achievable rates for two-way wire-tap channels
-
Nice, France, Jun
-
E. Tekin and A. Yener, "Achievable rates for two-way wire-tap channels," in Proc. IEEE Intl. Symp. Information Theory, Nice, France, Jun. 2007, pp. 941-945.
-
(2007)
Proc. IEEE Intl. Symp. Information Theory
, pp. 941-945
-
-
Tekin, E.1
Yener, A.2
-
14
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct
-
P. K. Gopala, L. Lai, and H. El Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
El Gamal, H.3
-
15
-
-
45249119255
-
-
Y. Liang, H. V. Poor, and S. Shamai (Shitz), Secure communication over fading channels, IEEE Trans. Inf. Theory, 54, no. 6, pp. 2470-2492, Jun. 2008.
-
Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, Jun. 2008.
-
-
-
-
16
-
-
45249104850
-
Wireless information-theoretic security
-
Jun
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inf. Theory vol. 54, no. 6, pp. 2515-2534, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
17
-
-
54749146734
-
Secure communication over wireless channels
-
La Jolla, CA, Jan
-
Z. Li, R. Yates, and W. Trappe, "Secure communication over wireless channels," in Proc. Information Theory and Application Workshop, La Jolla, CA, Jan. 2007.
-
(2007)
Proc. Information Theory and Application Workshop
-
-
Li, Z.1
Yates, R.2
Trappe, W.3
-
18
-
-
33749450172
-
Secrecy capacity of SIMO and slow fading channels
-
Adelaide, Australia, Sep
-
P. Parada and R. Blahut, "Secrecy capacity of SIMO and slow fading channels," in Proc. IEEE Int. Symp. Information Theory, Adelaide, Australia, Sep. 2005, pp. 2152-2155.
-
(2005)
Proc. IEEE Int. Symp. Information Theory
, pp. 2152-2155
-
-
Parada, P.1
Blahut, R.2
-
19
-
-
57349093480
-
The Gaussian multiple access wire-tap channel
-
to be published
-
E. Tekin and A. Yener, "The Gaussian multiple access wire-tap channel," IEEE Trans. Inf. Theory, to be published.
-
IEEE Trans. Inf. Theory
-
-
Tekin, E.1
Yener, A.2
-
20
-
-
45249101530
-
The general Gaussian multiple access and two-way wiretap channels: Achievable rates and cooperative jamming
-
Jun
-
E. Tekin and A. Yener, "The general Gaussian multiple access and two-way wiretap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
21
-
-
40949147785
-
Multiple access channels with confidential messages
-
Mar
-
Y. Liang and H. V. Poor, "Multiple access channels with confidential messages," IEEE Trans. Inf. Theory, vol. 54, no. 3, pp. 976-1002, Mar. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.3
, pp. 976-1002
-
-
Liang, Y.1
Poor, H.V.2
-
22
-
-
39049089566
-
The discrete memory-less multiple access channel with confidential messages
-
Seattle, WN, Jul
-
R. Liu, I. Maric, R. D. Yates, and P. Spasojevic, "The discrete memory-less multiple access channel with confidential messages," in Proc. IEEE Intl. Symp. Information Theory, Seattle, WN, Jul. 2006, pp. 957-961.
-
(2006)
Proc. IEEE Intl. Symp. Information Theory
, pp. 957-961
-
-
Liu, R.1
Maric, I.2
Yates, R.D.3
Spasojevic, P.4
-
23
-
-
84938932265
-
Coding for relay channels with confidential messages
-
Cairns, Australia, Sep
-
Y. Oohama, "Coding for relay channels with confidential messages," in Proc. IEEE Information Theory Workshop, Cairns, Australia, Sep. 2001, pp. 87-89.
-
(2001)
Proc. IEEE Information Theory Workshop
, pp. 87-89
-
-
Oohama, Y.1
-
24
-
-
70349947340
-
Relay channels with confidential messages
-
submitted for publication
-
Y. Oohama, "Relay channels with confidential messages," IEEE Trans. Inf. Theory, submitted for publication.
-
IEEE Trans. Inf. Theory
-
-
Oohama, Y.1
-
25
-
-
45249090083
-
Discrete memory-less interference and broadcast channels with confidential messages: Secrecy capacity regions
-
Jun
-
R. Liu, I. Maric, P. Spasojevic, and R. D. Yates, "Discrete memory-less interference and broadcast channels with confidential messages: Secrecy capacity regions," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2493-2507, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2493-2507
-
-
Liu, R.1
Maric, I.2
Spasojevic, P.3
Yates, R.D.4
-
26
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
Sep
-
L. Lai and H. El Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory., vol. 54, no. 9, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.9
-
-
Lai, L.1
El Gamal, H.2
-
27
-
-
33646073724
-
An achievable region for the Gaussian wiretap channel with side information
-
May
-
C. Mitrpant, A. J. H. Vinck, and Y. Luo, "An achievable region for the Gaussian wiretap channel with side information," IEEE Trans. Inf. Theory, vol. 52, no. 5, pp. 2181-2190, May 2006.
-
(2006)
IEEE Trans. Inf. Theory
, vol.52
, Issue.5
, pp. 2181-2190
-
-
Mitrpant, C.1
Vinck, A.J.H.2
Luo, Y.3
-
28
-
-
5144231861
-
On the role of MMSE estimation in approaching the information-theoretic limits of linear Gaussian channels: Shannon meets Wiener
-
Monticello, IL
-
G. D. Forney, Jr, "On the role of MMSE estimation in approaching the information-theoretic limits of linear Gaussian channels: Shannon meets Wiener," in Proc. Allerton Conf. Communication, Control, and Computing, Monticello, IL, 2003.
-
(2003)
Proc. Allerton Conf. Communication, Control, and Computing
-
-
Forney Jr, G.D.1
-
29
-
-
0034188157
-
Sphere-bound-achieving coset codes and multilevel coset codes
-
May
-
G. D. Forney, Jr, "Sphere-bound-achieving coset codes and multilevel coset codes," IEEE Trans. Inf. Theory, vol. 46, no. 3, pp. 820-850, May 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.3
, pp. 820-850
-
-
Forney Jr, G.D.1
-
30
-
-
0026837809
-
Trellis precoding: Combined coding, precoding and shaping for intersymbol interference channels
-
Mar
-
M. V. Eyuboglu and G. D. Forney, Jr, "Trellis precoding: Combined coding, precoding and shaping for intersymbol interference channels," IEEE Trans. Inf. Theory, vol. 38, no. 2, pp. 301-314, Mar. 1992.
-
(1992)
IEEE Trans. Inf. Theory
, vol.38
, Issue.2
, pp. 301-314
-
-
Eyuboglu, M.V.1
Forney Jr, G.D.2
-
31
-
-
5144221013
-
Achieving 1/2 log(1 + SNR) on the AWGN channel with lattice encoding and decoding
-
Oct
-
U. Erez and R. Zamir, "Achieving 1/2 log(1 + SNR) on the AWGN channel with lattice encoding and decoding," IEEE Trans. Inf. Theory, vol. 50, no. 10, pp. 2293-2314, Oct. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.10
, pp. 2293-2314
-
-
Erez, U.1
Zamir, R.2
-
32
-
-
2942653060
-
Lattice coding and decoding achieve the optimal diversity-multiplexing tradeoff of MIMO channels
-
Jun
-
H. El Gamal, G. Caire, and M. O. Damen, "Lattice coding and decoding achieve the optimal diversity-multiplexing tradeoff of MIMO channels," IEEE Trans. Inf. Theory, vol. 50, no. 6, pp. 968-985, Jun. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.6
, pp. 968-985
-
-
El Gamal, H.1
Caire, G.2
Damen, M.O.3
|