-
1
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, "The wire-tap channel," Bell System Technical Journal, volume 54, no.8, pp. 1355-1387, 1975.
-
(1975)
Bell System Technical Journal
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
2
-
-
0021595510
-
The wire-tap channel II
-
L. H. Ozarow, and A. D. Wyner, "The wire-tap channel II," Bell System Technical Journal, volume 63, no.10, pp. 2135-2157, 1984.
-
(1984)
Bell System Technical Journal
, vol.63
, Issue.10
, pp. 2135-2157
-
-
Ozarow, L.H.1
Wyner, A.D.2
-
3
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. on Information Theory, vol.24, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. on Information Theory
, vol.24
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
5
-
-
44049101918
-
On the achievable secrecy throughput of block fading channels with no channel state information at transmitter
-
March
-
X. Tang, R. Liu, P. Spasojevic, "On the achievable secrecy throughput of block fading channels with no channel state information at transmitter," 41st Annual Conference on Information Sciences and Systems CISS '07, pp. 917-922, March 2007.
-
(2007)
41st Annual Conference on Information Sciences and Systems CISS '07
, pp. 917-922
-
-
Tang, X.1
Liu, R.2
Spasojevic, P.3
-
6
-
-
70449501021
-
On the throughput of secure hybrid-ARQ protocols for Gaussian block-fading channels
-
June
-
X. Tang, R. Liu, P. Spasojević, and H. V. Poor, "On the throughput of secure hybrid-ARQ protocols for Gaussian block-fading channels," Proc. of ISIT 2007, pp. 1355-1387, June 2007.
-
(2007)
Proc. of ISIT 2007
, pp. 1355-1387
-
-
Tang, X.1
Liu, R.2
Spasojević, P.3
Poor, H.V.4
-
8
-
-
39049151282
-
LDPC-based secret key agreement over the Gaussian wiretap channel
-
July
-
M. Bloch, A. Thangaraj, S. W. McLaughlin, and J. Merolla, "LDPC-based secret key agreement over the Gaussian wiretap channel," Proc. of ISIT 2006, pp. 1179-1183, July 2006.
-
(2006)
Proc. of ISIT 2006
, pp. 1179-1183
-
-
Bloch, M.1
Thangaraj, A.2
McLaughlin, S.W.3
Merolla, J.4
-
9
-
-
34547922334
-
Applications of LDPC codes to the wiretap channel
-
August
-
A. Thangaraj, S. Dihidar, A. R. Calderbank, S. McLaughlin, and JM. Merolla, "Applications of LDPC codes to the wiretap channel," IEEE Trans. on Information Theory, volume 53, no.8, pp. 2933-2945, August 2007.
-
(2007)
IEEE Trans. on Information Theory
, vol.53
, Issue.8
, pp. 2933-2945
-
-
Thangaraj, A.1
Dihidar, S.2
Calderbank, A.R.3
McLaughlin, S.4
Merolla, J.M.5
-
10
-
-
33749452174
-
On achieving capacity on the wire tap channel using LDPC codes
-
September
-
A. Thangaraj, S. Dihidar, A. R. Calderbank, S. McLaughlin, and J-M. Merolla, "On achieving capacity on the wire tap channel using LDPC codes," Proc. of ISIT 2005, pp. 1498-1502, September 2005.
-
(2005)
Proc. of ISIT 2005
, pp. 1498-1502
-
-
Thangaraj, A.1
Dihidar, S.2
Calderbank, A.R.3
McLaughlin, S.4
Merolla, J.-M.5
-
12
-
-
84949223752
-
Weaknesses in the key scheduling algorithm of RC4
-
Serge Vaudenay and Amr M. Youssef, editors' Selected Areas in Cryptography 2001, Springer
-
S. Fluhrer, I. Mantin, and A. Shamir, "Weaknesses in the key scheduling algorithm of RC4," Serge Vaudenay and Amr M. Youssef, editors' Selected Areas in Cryptography 2001, volume 2259 of Lecture Notes in Computer Science, pp. 1-24, Springer 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2259
, pp. 1-24
-
-
Fluhrer, S.1
Mantin, I.2
Shamir, A.3
-
13
-
-
76249104851
-
-
KoreK. chopchop (Experimental WEP attacks)
-
KoreK. chopchop (Experimental WEP attacks). http://www.netstumbler.org/ showthread.php?t=12489, 2004.
-
(2004)
-
-
-
14
-
-
33751050307
-
-
KoreK
-
KoreK. Next generation of WEP attacks? http://www.netstumbler.org/f18/ next-generation-wep-attacks-12277/, 2004.
-
(2004)
Next Generation of WEP Attacks?
-
-
|