메뉴 건너뛰기




Volumn , Issue , 2008, Pages 681-685

End-to-end secure multi-hop communication with untrusted relays is possible

Author keywords

[No Author keywords available]

Indexed keywords

ARBITRARY NUMBER; INFORMATION NEED; LATTICE CODES; MULTI HOP COMMUNICATION; NUMBER OF HOPS; PERFECT SECRECY; RANDOM CODES; RELAY NODE; SECURE COMMUNICATIONS; SOURCE-DESTINATION PAIRS;

EID: 70349687277     PISSN: 10586393     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSSC.2008.5074494     Document Type: Conference Paper
Times cited : (4)

References (12)
  • 2
    • 45249090083 scopus 로고    scopus 로고
    • Discrete Memoryless Interference and Broadcast Channels with Confidential Messages: Secrecy Rate Regions
    • June
    • R. Liu, I. Maric, P. Spasojevic, and R. D. Yates. Discrete Memoryless Interference and Broadcast Channels with Confidential Messages: Secrecy Rate Regions. IEEE Transactions on Information Theory, 54(6):2493-2507, June 2008.
    • (2008) IEEE Transactions on Information Theory , vol.54 , Issue.6 , pp. 2493-2507
    • Liu, R.1    Maric, I.2    Spasojevic, P.3    Yates, R.D.4
  • 3
    • 45249101530 scopus 로고    scopus 로고
    • The General Gaussian Multiple Access and Two- Way Wire-Tap Channels: Achievable Rates and Cooperative Jamming
    • June
    • E. Tekin and A. Yener. The General Gaussian Multiple Access and Two- Way Wire-Tap Channels: Achievable Rates and Cooperative Jamming. IEEE Transactions on Information Theory, 54(6):2735-2751, June 2008.
    • (2008) IEEE Transactions on Information Theory , vol.54 , Issue.6 , pp. 2735-2751
    • Tekin, E.1    Yener, A.2
  • 6
    • 67249087217 scopus 로고    scopus 로고
    • Two-hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming
    • November
    • X. He and A. Yener. Two-hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming. IEEE Global Telecommunication Conference, November 2008.
    • (2008) IEEE Global Telecommunication Conference
    • He, X.1    Yener, A.2
  • 7
    • 5144221013 scopus 로고    scopus 로고
    • Achieving 1/2 log (1+ SNR) on the AWGN Channel with Lattice Encoding and Decoding
    • October
    • U. Erez and R. Zamir. Achieving 1/2 log (1+ SNR) on the AWGN Channel with Lattice Encoding and Decoding. IEEE Transactions on Information Theory, 50(10):2293-2314, October 2004.
    • (2004) IEEE Transactions on Information Theory , vol.50 , Issue.10 , pp. 2293-2314
    • Erez, U.1    Zamir, R.2
  • 9
    • 55349095058 scopus 로고    scopus 로고
    • The Wiretap Channel with Feedback: Encryption over the Channel
    • November
    • L. Lai, H. El Gamal, and H.V. Poor. The Wiretap Channel with Feedback: Encryption over the Channel. IEEE Transaction on Information Theory, 54(11):5059-5067, November 2008.
    • (2008) IEEE Transaction on Information Theory , vol.54 , Issue.11 , pp. 5059-5067
    • Lai, L.1    El Gamal, H.2    Poor, H.V.3
  • 10
    • 33947397919 scopus 로고    scopus 로고
    • Capacity with Causal and Non-Causal Side Information - A Unified View
    • December
    • S.A. Jafar. Capacity with Causal and Non-Causal Side Information - A Unified View. IEEE Transactions on Information Theory, 52(12):5468-5475, December 2006.
    • (2006) IEEE Transactions on Information Theory , vol.52 , Issue.12 , pp. 5468-5475
    • Jafar, S.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.