-
2
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
June
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Transactions on Wireless Communications, vol. 7, no. 6, pp. 2180-2189, June 2008.
-
(2008)
IEEE Transactions on Wireless Communications
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
3
-
-
0042826822
-
Independent component analysis: Algorithms and applications
-
DOI 10.1016/S0893-6080(00)00026-5, PII S0893608000000265
-
A. Hyvärinen and E. Oja, "Independent component analysis: algorithms and applications," Neural networks, vol. 13, no. 4-5, pp. 411-430, 2000. (Pubitemid 30447427)
-
(2000)
Neural Networks
, vol.13
, Issue.4-5
, pp. 411-430
-
-
Hyvarinen, A.1
Oja, E.2
-
4
-
-
0032188650
-
Blind equalization using the constant modulus criterion: A review
-
Oct
-
J. Johnson, R., P. Schniter, T. Endres, J. Behm, D. Brown, and R. Casas, "Blind equalization using the constant modulus criterion: a review," Proceedings of the IEEE, vol. 86, no. 10, pp. 1927-1950, Oct 1998.
-
(1998)
Proceedings of the IEEE
, vol.86
, Issue.10
, pp. 1927-1950
-
-
Johnson, J.1
Schniter, R.P.2
Endres, T.3
Behm, J.4
Brown, D.5
Casas, R.6
-
5
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, "Communication theory of secrecy systems," Bell System Technical Journal, vol. 28, pp. 656-715, 1949.
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
6
-
-
34347271683
-
A private key agreement scheme based on fluctuations of ber in wireless communications
-
The 9th International Conference on Feb.
-
T. Kitano, A. Kitaura, H. Iwai, and H. Sasaoka, "A private key agreement scheme based on fluctuations of ber in wireless communications," in Advanced Communication Technology, The 9th International Conference on, vol. 3, Feb. 2007, pp. 1495-1499.
-
(2007)
Advanced Communication Technology
, vol.3
, pp. 1495-1499
-
-
Kitano, T.1
Kitaura, A.2
Iwai, H.3
Sasaoka, H.4
-
9
-
-
49549088388
-
A near-field modulation technique using antenna reflector switching
-
Feb.
-
A. Babakhani, D. Rutledge, and A. Hajimiri, "A near-field modulation technique using antenna reflector switching," in IEEE International Solid-State Circuits Conference (ISSCC), Feb. 2008, pp. 188-605.
-
(2008)
IEEE International Solid-State Circuits Conference (ISSCC)
, pp. 188-605
-
-
Babakhani, A.1
Rutledge, D.2
Hajimiri, A.3
-
10
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, "The wire-tap channel," Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, 1975.
-
(1975)
Bell System Technical Journal
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
11
-
-
0017996501
-
The Gaussian wire-tap channel
-
Jul
-
S. Leung-Yan-Cheong and M. Hellman, "The gaussian wire-tap channel," IEEE Transactions on Information Theory, vol. 24, no. 4, pp. 451-456, Jul 1978.
-
(1978)
IEEE Transactions on Information Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.1
Hellman, M.2
-
12
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Transactions on Information Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Transactions on Information Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszar, I.1
Korner, J.2
-
13
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct.
-
P. K. Gopala, L. Lai, and H. E. Gamal, "On the secrecy capacity of fading channels," IEEE Transactions on Information Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
Gamal, H.E.3
-
16
-
-
0006565354
-
Communication as a game
-
N. Blachman, "Communication as a game," in Proc. IRE WESCON Conf, 1957, pp. 61-66.
-
(1957)
Proc. IRE WESCON Conf
, pp. 61-66
-
-
Blachman, N.1
-
17
-
-
0000746630
-
Optimum information transmission through a channel with unknown parameters
-
R. Dobrushin, "Optimum information transmission through a channel with unknown parameters," Radio Eng. Electron, vol. 4, no. 12, pp. 1-8, 1959.
-
(1959)
Radio Eng. Electron
, vol.4
, Issue.12
, pp. 1-8
-
-
Dobrushin, R.1
-
18
-
-
0021820978
-
Some information theoretic saddlepoints
-
J. Borden, D. Mason, and R. McEliece, "Some information theoretic saddlepoints," SIAM Journal on Control and Optimization, vol. 23, p. 129, 1985.
-
(1985)
SIAM Journal on Control and Optimization
, vol.23
, pp. 129
-
-
Borden, J.1
Mason, D.2
McEliece, R.3
-
19
-
-
0026913942
-
Worst-case power-constrained noise for binary-input channels
-
S. Shamai and S. Verdu, "Worst-case power-constrained noise for binary-input channels," IEEE Transactions on Information Theory, vol. 38, no. 5, pp. 1494-1511, 1992.
-
(1992)
IEEE Transactions on Information Theory
, vol.38
, Issue.5
, pp. 1494-1511
-
-
Shamai, S.1
Verdu, S.2
-
21
-
-
77949627458
-
Interference suppression in the presence of quantization errors
-
September
-
O. Bakr, M. Johnson, R. Mudumbai, and U. Madhow, "Interference suppression in the presence of quantization errors," in Allerton Conference on Communication, Control, and Computing, September 2009.
-
(2009)
Allerton Conference on Communication, Control, and Computing
-
-
Bakr, O.1
Johnson, M.2
Mudumbai, R.3
Madhow, U.4
|