-
1
-
-
0016562514
-
The wire-tap channel
-
Oct
-
A. D. Wyner, "The wire-tap channel," Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell System Technical Journal
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
2
-
-
0017996501
-
The gaussian wiretap channel
-
Jul
-
S. K. Leung-Yan-Cheong and M. E. Hellman, "The gaussian wiretap channel," IEEE Transactions on Information Theory, vol. 24, no. 4, pp. 451-456, Jul. 1978.
-
(1978)
IEEE Transactions on Information Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.K.1
Hellman, M.E.2
-
3
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Transactions on Information Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Transactions on Information Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
4
-
-
0347337828
-
Secure space-time communication
-
Dec
-
A. O. Hero, "Secure space-time communication," IEEE Transactions on Information Theory, vol. 49, no. 12, pp. 3235-3249, Dec. 2003.
-
(2003)
IEEE Transactions on Information Theory
, vol.49
, Issue.12
, pp. 3235-3249
-
-
Hero, A.O.1
-
5
-
-
44049095075
-
Secret communication via multi-antenna transmission
-
Baltimore, MD, Mar
-
Z. Li, W. Trappe, and R. Yates, "Secret communication via multi-antenna transmission," in Proceedings of 41st Conference on Information Sciences and Systems, Baltimore, MD, Mar. 2007.
-
(2007)
Proceedings of 41st Conference on Information Sciences and Systems
-
-
Li, Z.1
Trappe, W.2
Yates, R.3
-
6
-
-
84931425598
-
Secret communication using artificial noise
-
Dallas, TX, Sep
-
R. Negi and S. Goelm, "Secret communication using artificial noise," in Proceedings of IEEE Vehicular Technology Conference - Fall, vol. 3, Dallas, TX, Sep. 2005, pp. 1906-1910.
-
(2005)
Proceedings of IEEE Vehicular Technology Conference - Fall
, vol.3
, pp. 1906-1910
-
-
Negi, R.1
Goelm, S.2
-
7
-
-
33749450172
-
Secrecy capacity of simo and slow fading channels
-
Adelaide, Australia, Sep
-
P. Parada and R. Blahut, "Secrecy capacity of simo and slow fading channels," in Proceedings of IEEE International Symposium on Information Theory, Adelaide, Australia, Sep. 2005, pp. 2152-2155.
-
(2005)
Proceedings of IEEE International Symposium on Information Theory
, pp. 2152-2155
-
-
Parada, P.1
Blahut, R.2
-
8
-
-
51649110931
-
Achievable rates in gaussian miso channels with secrecy constraints
-
Nice, France, Jun
-
S. Shafiee and S. Ulukus, "Achievable rates in gaussian miso channels with secrecy constraints," in Proceedings of IEEE International Symposium on Information Theory, Nice, France, Jun. 2007, pp. 2466-2470.
-
(2007)
Proceedings of IEEE International Symposium on Information Theory
, pp. 2466-2470
-
-
Shafiee, S.1
Ulukus, S.2
-
9
-
-
45249119255
-
-
Y. Liang, H. V. Poor, and S. S. (Shitz), Secure communication over fading channels, IEEE Transactions on Information Theory, 54, no. 6, pp. 2470-2492, Jun. 2008.
-
Y. Liang, H. V. Poor, and S. S. (Shitz), "Secure communication over fading channels," IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 2470-2492, Jun. 2008.
-
-
-
-
10
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct
-
P. K. Gopala, L. Lai, and H. E. Gamal, "On the secrecy capacity of fading channels," IEEE Transactions on Information Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
Gamal, H.E.3
-
11
-
-
77950009736
-
Secure collaborative beamforming
-
Allerton, IL, Oct
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Secure collaborative beamforming," in Proceedings of the Forty-Seventh Annual Allerton Conference on Communication, Control, and Computing, Allerton, IL, Oct. 2008.
-
(2008)
Proceedings of the Forty-Seventh Annual Allerton Conference on Communication, Control, and Computing
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
12
-
-
4544354908
-
Correlated jamming on mimo gaussian fading channels
-
Sep
-
A. Kashyap, T. Başar, and R. Srikant, "Correlated jamming on mimo gaussian fading channels," IEEE Transactions on Information Theory, vol. 50, no. 9, pp. 2119-2123, Sep. 2004.
-
(2004)
IEEE Transactions on Information Theory
, vol.50
, Issue.9
, pp. 2119-2123
-
-
Kashyap, A.1
Başar, T.2
Srikant, R.3
-
13
-
-
70349619181
-
Mutual information games in multi-user channels with correlated jamming
-
Oct
-
S. Shafiee and S. Ulukus, "Mutual information games in multi-user channels with correlated jamming," IEEE Transactions on Information Theory, vol. 55, no. 10, pp. 4598-4607, Oct. 2009.
-
(2009)
IEEE Transactions on Information Theory
, vol.55
, Issue.10
, pp. 4598-4607
-
-
Shafiee, S.1
Ulukus, S.2
-
14
-
-
44049095259
-
Spatially-correlated jamming in gaussian multiple access and broadcast channels
-
Princeton, NJ, Mar
-
M. H. Brady, M. Mohseni, and J. M. Cioffi, "Spatially-correlated jamming in gaussian multiple access and broadcast channels," in Proceedings of 40th Annual Conference on Information Sciences and Systems, Princeton, NJ, Mar. 2006.
-
(2006)
Proceedings of 40th Annual Conference on Information Sciences and Systems
-
-
Brady, M.H.1
Mohseni, M.2
Cioffi, J.M.3
-
15
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
Oct
-
L. Lai and H. E. Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Transactions on Information Theory, vol. 54, no. 10, pp. 4005-4019, Oct. 2008.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.10
, pp. 4005-4019
-
-
Lai, L.1
Gamal, H.E.2
-
17
-
-
0036474829
-
Efficient power control via pricing in wireless data networks
-
Feb
-
C. U. Saraydar, N. B. Mandayam, and D. J. Goodman, "Efficient power control via pricing in wireless data networks," IEEE Transations on Communications, vol. 50, no. 2, pp. 291-303, Feb. 2002.
-
(2002)
IEEE Transations on Communications
, vol.50
, Issue.2
, pp. 291-303
-
-
Saraydar, C.U.1
Mandayam, N.B.2
Goodman, D.J.3
-
18
-
-
33947641991
-
Potential games: A framework for vector power control problems with coupled constraints
-
Toulouse, France, May
-
G. Scutari, S. Barbarossa, and D. P. Palomar, "Potential games: a framework for vector power control problems with coupled constraints," in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), vol. 4, Toulouse, France, May 2006.
-
(2006)
IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
, vol.4
-
-
Scutari, G.1
Barbarossa, S.2
Palomar, D.P.3
-
19
-
-
34548364231
-
Distributed relay selection and power control for multiuser cooperative communication networks using buyer / seller game
-
Anchorage, AK, May
-
B. Wang, Z. Han, and K. J. R. Liu, "Distributed relay selection and power control for multiuser cooperative communication networks using buyer / seller game," in Proceedings of Annual IEEE Conference on Computer Communications (INFOCOM 2007), Anchorage, AK, May 2009, pp. 2678-2682.
-
(2009)
Proceedings of Annual IEEE Conference on Computer Communications (INFOCOM 2007)
, pp. 2678-2682
-
-
Wang, B.1
Han, Z.2
Liu, K.J.R.3
-
20
-
-
50649105039
-
Non-atomic games for multi-user systems
-
Sep
-
N. Bonneau, M. Debbah, E. Altman, and A. Hjørungnes, "Non-atomic games for multi-user systems," IEEE Journal on Selected Areas in Communications, issue on Game Theory in Communication Systems, vol. 26, no. 7, pp. 1047-1058, Sep. 2008.
-
(2008)
IEEE Journal on Selected Areas in Communications, issue on Game Theory in Communication Systems
, vol.26
, Issue.7
, pp. 1047-1058
-
-
Bonneau, N.1
Debbah, M.2
Altman, E.3
Hjørungnes, A.4
-
21
-
-
70349991516
-
Physical layer security game: How to date a girl with her boyfriend on the same table
-
Istanbul, Turkey, May
-
Z. Han, N. Marina, M. Debbah, and A. Hjørungnes, "Physical layer security game: How to date a girl with her boyfriend on the same table," in Proceedings of the IEEE International Conference on Game Theory for Networks (GameNets 2009), Istanbul, Turkey, May 2009, pp. 2678-2682.
-
(2009)
Proceedings of the IEEE International Conference on Game Theory for Networks (GameNets 2009)
, pp. 2678-2682
-
-
Han, Z.1
Marina, N.2
Debbah, M.3
Hjørungnes, A.4
-
22
-
-
0141495795
-
-
Cambridge, MA: Academic Press
-
V. Krishna, Auction Theory. Cambridge, MA: Academic Press, 2002.
-
(2002)
Auction Theory
-
-
Krishna, V.1
-
23
-
-
33646597275
-
Auction-based spectrum sharing
-
June
-
J. Huang, R. Berry, and M. L. Honig, "Auction-based spectrum sharing," ACM Mobile Networks and Applications Journal, vol. 11, no. 3, pp. 405-418, June 2006.
-
(2006)
ACM Mobile Networks and Applications Journal
, vol.11
, Issue.3
, pp. 405-418
-
-
Huang, J.1
Berry, R.2
Honig, M.L.3
-
24
-
-
77949960178
-
-
J. Huang and Z. Han, Game theory for spectrum sharing, book chapter in 'Cognitive Radio Networks', Auerbach Publications, CRC Press, 2009.
-
J. Huang and Z. Han, "Game theory for spectrum sharing," book chapter in 'Cognitive Radio Networks', Auerbach Publications, CRC Press, 2009.
-
-
-
-
25
-
-
50649122537
-
Auction-based resource allocation for cooperative communications
-
September
-
J. Huang, Z. Han, M. Chiang, and H. V. Poor, "Auction-based resource allocation for cooperative communications," IEEE Journal on Selected Areas in Communications, vol. 26, no. 7, pp. 1226-1237, September 2008.
-
(2008)
IEEE Journal on Selected Areas in Communications
, vol.26
, Issue.7
, pp. 1226-1237
-
-
Huang, J.1
Han, Z.2
Chiang, M.3
Poor, H.V.4
|