-
1
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, "Communication theory of secrecy systems", Bell Syst. Tech. J., vol. 29, pp. 656-715, 1949.
-
(1949)
Bell Syst. Tech. J
, vol.29
, pp. 656-715
-
-
Shannon, C.E.1
-
2
-
-
0016562514
-
The wire-tap channel
-
Oct
-
A. D. Wyner, "The wire-tap channel", Bell Syst. Tech. J., vol. 54, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
-
3
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszar and J. Korner, "Broadcast channels with confidential messages", IEEE Trans. Inf. Theory, vol. 24, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, pp. 339-348
-
-
Csiszar, I.1
Korner, J.2
-
4
-
-
0347337828
-
Secure space-time communication
-
Dec
-
A. O. Hero, "Secure space-time communication", IEEE Trans. Inf. Theory, vol. 49, no. 12, pp. 3235-3249, Dec. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.12
, pp. 3235-3249
-
-
Hero, A.O.1
-
5
-
-
51849132358
-
Using antenna array redundancy and channel diversity for secure wireless transmissions
-
May
-
X. Li and J. Hwu, "Using antenna array redundancy and channel diversity for secure wireless transmissions", J. Commun., vol. 2, no. 3, pp. 24-32, May 2007.
-
(2007)
J. Commun
, vol.2
, Issue.3
, pp. 24-32
-
-
Li, X.1
Hwu, J.2
-
6
-
-
44849094850
-
Secure M1MO communcications in a system with equal numbers of transmit and receive antennas
-
May
-
H. Kim and J. D. Villasenor, "Secure M1MO communcications in a system with equal numbers of transmit and receive antennas", IEEE Commun. Lett., vol. 12, no. 5, pp. 386-388, May 2008.
-
(2008)
IEEE Commun. Lett
, vol.12
, Issue.5
, pp. 386-388
-
-
Kim, H.1
Villasenor, J.D.2
-
8
-
-
45249101530
-
The general Gaussian multiple-access and twoway wire-tap channels: Achievable rates and cooperative jamming
-
June
-
E. Tekin and A. Yener, "The general Gaussian multiple-access and twoway wire-tap channels: Achievable rates and cooperative jamming", IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, June 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
10
-
-
34547922334
-
Applications of LDPC codes to the wiretap channel
-
Aug
-
A. Thangaraj, S. Dihidar, A. R. Calderbank, S. McLaughlin, and J. M. Merolla, "Applications of LDPC codes to the wiretap channel", IEEE Trans. Inf. Theory, vol. 53, no. 8, pp. 2933-2945, Aug. 2007.
-
(2007)
IEEE Trans. Inf. Theory
, vol.53
, Issue.8
, pp. 2933-2945
-
-
Thangaraj, A.1
Dihidar, S.2
Calderbank, A.R.3
McLaughlin, S.4
Merolla, J.M.5
-
11
-
-
45249104850
-
Wireless information theoretic security
-
June
-
M. Nloch, J. Barros and M. R. D. Rodrigues, "Wireless information theoretic security", IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, June 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Nloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
-
12
-
-
4544245136
-
Exact thresholds and optimal codes for the binary-symmetric channel and gallager's decoding algorithm A
-
Sept
-
L. Bazzi, T. J. Richardson, and R. L. Urbanke, "Exact thresholds and optimal codes for the binary-symmetric channel and gallager's decoding algorithm A", IEEE Trans. Inf. Theory, vol. 50, no. 9, pp. 2010-2021, Sept. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.9
, pp. 2010-2021
-
-
Bazzi, L.1
Richardson, T.J.2
Urbanke, R.L.3
-
13
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
Mar
-
U. Maurer, "Secret key agreement by public discussion from common information", IEEE Trans. Inf. Theory, vol. 39, pp. 733-742, Mar. 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, pp. 733-742
-
-
Maurer, U.1
-
14
-
-
0027297425
-
Near Shannon limit error correcting coding and decoding: Turbo codes
-
Geneva, Switzerland
-
C. Berrou, A. Glavieux, and P. Thitimajshima, "Near Shannon limit error correcting coding and decoding: Turbo codes", in Proc. IEEE ICC, (Geneva, Switzerland), 1993, pp. 1064-1070.
-
(1993)
Proc. IEEE ICC
, pp. 1064-1070
-
-
Berrou, C.1
Glavieux, A.2
Thitimajshima, P.3
-
16
-
-
0033099611
-
Good error-correcting codes based on very sparse matrices
-
Mar
-
D. J. C. MacKay, "Good error-correcting codes based on very sparse matrices", IEEE Trans. Inf. Theory, vol. 45, pp. 399-431, Mar. 1999.
-
(1999)
IEEE Trans. Inf. Theory
, vol.45
, pp. 399-431
-
-
MacKay, D.J.C.1
-
17
-
-
0003617018
-
Theoretically and computationally secure key agreement in cryptography
-
Ph. D. Dissertation
-
S. Wolf, "Theoretically and computationally secure key agreement in cryptography", Ph. D. Dissertation, 1999.
-
(1999)
-
-
Wolf, S.1
-
18
-
-
0027629488
-
Common randomness in information theory and cryptography, part I: Secret sharing
-
July
-
I. Csiszar and P. Narayan, "Common randomness in information theory and cryptography, part I: Secret sharing", IEEE Trans. Inf. Theory, vol. 39, pp. 1121-1132, July 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, pp. 1121-1132
-
-
Csiszar, I.1
Narayan, P.2
-
19
-
-
33747886952
-
Secret key agreement from correlated source outputs using low density parity check matrices
-
July
-
J. Muramatsu, "Secret key agreement from correlated source outputs using low density parity check matrices", IEICE Trans. Fund. Elec. Comm. Comp., vol. E89-A, no. 7, pp. 2036-2046, July 2006.
-
(2006)
IEICE Trans. Fund. Elec. Comm. Comp
, vol.E89-A
, Issue.7
, pp. 2036-2046
-
-
Muramatsu, J.1
-
20
-
-
46249114443
-
Variable rate LDPC codes for wireless applications
-
B. Marco, C. iovanni, and C. Franco, "Variable rate LDPC codes for wireless applications", in Proc. SoftCOM, 2006, pp. 301-305.
-
(2006)
Proc. SoftCOM
, pp. 301-305
-
-
Marco, B.1
iovanni, C.2
Franco, C.3
|