-
1
-
-
84940643430
-
Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois, USA
-
Sept, See
-
A. AVESTIMEHR, S. DIGGAVI, AND D. TSE, A deterministic approach to wireless relay networks, in Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois, USA, Sept. 2007. See: http://licos.epfl.ch/index.php?p=research-projWNC.
-
(2007)
A deterministic approach to wireless relay networks
-
-
AVESTIMEHR, A.1
DIGGAVI, S.2
TSE, D.3
-
2
-
-
84940666980
-
Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois, USA
-
Sept, See
-
-, Wireless network information flow, in Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois, USA, Sept. 2007. See: http://licos.epfl.ch/index.php?p=research-projWNC.
-
(2007)
Wireless network information flow
-
-
AVESTIMEHR, A.1
DIGGAVI, S.2
TSE, D.3
-
9
-
-
33747142749
-
The capacity of wireless networks
-
P. GUPTA AND P. KUMAR, The capacity of wireless networks, IEEE Trans. Inform. Theory, 46 (2000), pp. 388-404.
-
(2000)
IEEE Trans. Inform. Theory
, vol.46
, pp. 388-404
-
-
GUPTA, P.1
KUMAR, P.2
-
11
-
-
51349098469
-
Relay channels with confidential messages
-
submitted
-
Y. OOHAMA, Relay channels with confidential messages, IEEE Trans. Inform. Theory, (2006). submitted.
-
(2006)
IEEE Trans. Inform. Theory
-
-
OOHAMA, Y.1
-
12
-
-
35148893949
-
Hierarchical cooperation achieves optimal capacity scaling in ad hoc networks
-
A. ÖZGÜR, O. LÉVÊQUE, AND D. TSE, Hierarchical cooperation achieves optimal capacity scaling in ad hoc networks, IEEE Transactions on Information Theory, 53 (2007), pp. 3549-3572.
-
(2007)
IEEE Transactions on Information Theory
, vol.53
, pp. 3549-3572
-
-
ÖZGÜR, A.1
LÉVÊQUE, O.2
TSE, D.3
-
13
-
-
64549104381
-
On cooperative wireless network secrecy
-
Tech. Rep. LICOS-REPORT-2008-009, École Polytechnique Federale de Lausanne, Switzerland, Aug
-
E. PERRON, S. DIGGAVI, AND E. TELATAR, On cooperative wireless network secrecy, Tech. Rep. LICOS-REPORT-2008-009, École Polytechnique Federale de Lausanne, Switzerland, Aug. 2008. http://infoscience.epfl.ch/record/126166.
-
(2008)
-
-
PERRON, E.1
DIGGAVI, S.2
TELATAR, E.3
-
14
-
-
70349282001
-
On noise insertion strategies for wireless network secrecy
-
San Diego, USA, Feb
-
-, On noise insertion strategies for wireless network secrecy, in Proc. of the Information Theory and Applications Workshop, San Diego, USA, Feb. 2009.
-
(2009)
Proc. of the Information Theory and Applications Workshop
-
-
PERRON, E.1
DIGGAVI, S.2
TELATAR, E.3
-
15
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. RIVEST, A. SHAMIR, AND L. ADLEMAN, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, 21 (1978), pp. 120-126.
-
(1978)
Communications of the ACM
, vol.21
, pp. 120-126
-
-
RIVEST, R.1
SHAMIR, A.2
ADLEMAN, L.3
-
16
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. SHANNON, Communication theory of secrecy systems, Bell System Tech. J., 28 (1949), pp. 656-715.
-
(1949)
Bell System Tech. J
, vol.28
, pp. 656-715
-
-
SHANNON, C.E.1
-
18
-
-
84889281816
-
-
TH.M. COVER AND J. THOMAS, Elements of Information Theory, Wiley, New York, 1991.
-
TH.M. COVER AND J. THOMAS, Elements of Information Theory, Wiley, New York, 1991.
-
-
-
-
20
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
M. WEGMAN AND J. CARTER, New hash functions and their use in authentication and set equality, Journal of Computer and System Sciences, 22 (1981), pp. 265-279.
-
(1981)
Journal of Computer and System Sciences
, vol.22
, pp. 265-279
-
-
WEGMAN, M.1
CARTER, J.2
-
21
-
-
0016562514
-
The wire-tap channel
-
A. D. WYNER, The wire-tap channel, Bell System Tech. J., 54 (1975), pp. 1355-1387.
-
(1975)
Bell System Tech. J
, vol.54
, pp. 1355-1387
-
-
WYNER, A.D.1
-
22
-
-
2442587377
-
A network information theory for wireless communication: Scaling laws and optimal operation
-
L.-L. XIE AND P. KUMAR, A network information theory for wireless communication: Scaling laws and optimal operation, IEEE Trans. Inform. Theory, 50 (2004), pp. 748-767.
-
(2004)
IEEE Trans. Inform. Theory
, vol.50
, pp. 748-767
-
-
XIE, L.-L.1
KUMAR, P.2
|