-
1
-
-
0016562514
-
The Wire-Tap Channel
-
October
-
A. D. Wyner, "The Wire-Tap Channel," Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1367, October 1975.
-
(1975)
Bell System Technical Journal
, vol.54
, Issue.8
, pp. 1355-1367
-
-
Wyner, A.D.1
-
2
-
-
0017973511
-
Broadcast Channels with Confidential Messages
-
May
-
I. Csiszár and J. Körner, "Broadcast Channels with Confidential Messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
3
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, "Communication theory of secrecy systems," Bell System Technical Journal, vol. 28, pp. 656-715, 1948.
-
(1948)
Bell System Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
4
-
-
39049144353
-
Secrecy capacity of wireless channels
-
Seattle, USA
-
J. Barros and M. R. D. Rodrigues, "Secrecy capacity of wireless channels," in Proc. IEEE International Symposium on Information Theory, Seattle, USA, 2006, pp. 356-360.
-
(2006)
Proc. IEEE International Symposium on Information Theory
, pp. 356-360
-
-
Barros, J.1
Rodrigues, M.R.D.2
-
5
-
-
45249106562
-
On the secrecy capacity of fading channels
-
Nice, France, June
-
P. K. Gopala, L. Lai, and H. El-Gamal, "On the secrecy capacity of fading channels," in Proc. of IEEE International Symposium on Information Theory, Nice, France, June 2007.
-
(2007)
Proc. of IEEE International Symposium on Information Theory
-
-
Gopala, P.K.1
Lai, L.2
El-Gamal, H.3
-
6
-
-
45249119255
-
-
Y. Liang, H. V. Poor, and S. Shamai (Shitz), Secure communication over fading channels, IEEE Trans. Inf. Theory, 54, no. 6, pp. 2470-2492, 2008.
-
Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, 2008.
-
-
-
-
7
-
-
84940647248
-
-
Y. Liang, G. Kramer, H. V. Poor, and S. S. (Shitz), Compound wire-tap channels, in Proc. of the Allerton Conference on Communications, Control, and Computing, Allerton, IL, September 2007.
-
Y. Liang, G. Kramer, H. V. Poor, and S. S. (Shitz), "Compound wire-tap channels," in Proc. of the Allerton Conference on Communications, Control, and Computing, Allerton, IL, September 2007.
-
-
-
-
8
-
-
45249092485
-
Secure broadcasting over fading channels
-
A. Khisti, A. Tchamkerten, and G. W. Wornell, "Secure broadcasting over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2453-2469, 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2453-2469
-
-
Khisti, A.1
Tchamkerten, A.2
Wornell, G.W.3
-
9
-
-
40949147785
-
Multiple-access channels with confidential messages
-
March
-
Y. Liang and H. V. Poor, "Multiple-access channels with confidential messages," IEEE Trans. Inf. Theory, vol. 54, no. 3, pp. 976-1002, March 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.3
, pp. 976-1002
-
-
Liang, Y.1
Poor, H.V.2
-
10
-
-
45249101530
-
The general gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming
-
E. Tekin and A. Yener, "The general gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
11
-
-
33645727315
-
General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channel
-
April
-
M. Hayashi, "General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channel," IEEE Trans. Inf. Theory, vol. 52, no. 4, pp. 1562-1575, April 2006.
-
(2006)
IEEE Trans. Inf. Theory
, vol.52
, Issue.4
, pp. 1562-1575
-
-
Hayashi, M.1
-
13
-
-
33750408223
-
How to attain the ordinary channel capacity securely in wiretap channels
-
D. Kobayashi, H. Yamamoto, and T. Ogawa, "How to attain the ordinary channel capacity securely in wiretap channels," in Proc. IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005, pp. 13-18.
-
(2005)
Proc. IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security
, pp. 13-18
-
-
Kobayashi, D.1
Yamamoto, H.2
Ogawa, T.3
-
14
-
-
33749427184
-
On an upper bound of the secrecy capacity for a general wiretap channel
-
Adelaide, Australia, September
-
H. Koga and N. Sato, "On an upper bound of the secrecy capacity for a general wiretap channel," in Proc. International Symposium on Information Theory ISIT 2005, Adelaide, Australia, September 2005, pp. 1641-1645.
-
(2005)
Proc. International Symposium on Information Theory ISIT 2005
, pp. 1641-1645
-
-
Koga, H.1
Sato, N.2
-
15
-
-
0003180975
-
Certain results in coding theory for noisy channels
-
September
-
C. E. Shannon, "Certain results in coding theory for noisy channels," Inform. Contr., vol. 1, pp. 6-25, September 1957.
-
(1957)
Inform. Contr
, vol.1
, pp. 6-25
-
-
Shannon, C.E.1
-
19
-
-
84948960386
-
-
U. M. Maurer and S. Wolf, Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free, in Advances in Cryptology - Eurocrypt 2000, Lecture Notes in Computer Science. B. Preneel, 2000, p. 351.
-
U. M. Maurer and S. Wolf, "Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free," in Advances in Cryptology - Eurocrypt 2000, Lecture Notes in Computer Science. B. Preneel, 2000, p. 351.
-
-
-
-
20
-
-
0017996501
-
The Gaussian Wire-Tap Channel
-
July
-
S. K. Leung-Yan-Cheong and M. E. Hellman, "The Gaussian Wire-Tap Channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, July 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.K.1
Hellman, M.E.2
|